Re: [FD] [oss-security] Bug in bash <= 4.3 [security feature bypassed]

2014-06-05 Thread Jeffrey Walton
> 2014-06-03 16:16 GMT+02:00 Hector Marco : > > Hi everyone, > > Recently we discovered a bug in bash. After some time after reporting > it to bash developers, it has not been fixed. > > We think that this is a security issue because in some circumstances > the bash security feature could be bypass

Re: [FD] Computer hackers face life in prison under new Government crackdown on cyber terrorism | Mail Online

2014-06-05 Thread Jeffrey Walton
On Thu, Jun 5, 2014 at 8:36 PM, Ivan .Heca wrote: > http://www.dailymail.co.uk/news/article-2649452/Computer-hackers-face-life-prison-new-Government-crackdown-cyber-terrorism.html?ITO=1490&ns_mchannel=rss&ns_campaign=1490 > I can see where this could be abused. Its a lot like the Computer Fraud an

Re: [FD] More OpenSSL issues

2014-06-05 Thread Brandon Vincent
Per the security advisory: "The attack can only be performed between a vulnerable client *and* server." This would have produced quite a media nightmare if most browsers used OpenSSL instead of NSS, etc. Chrome for Android was affected and is patched in 35.0.1916.141. Brandon Vincent _

[FD] Computer hackers face life in prison under new Government crackdown on cyber terrorism | Mail Online

2014-06-05 Thread Ivan .Heca
http://www.dailymail.co.uk/news/article-2649452/Computer-hackers-face-life-prison-new-Government-crackdown-cyber-terrorism.html?ITO=1490&ns_mchannel=rss&ns_campaign=1490 ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/f

Re: [FD] [oss-security] Bug in bash <= 4.3 [security feature bypassed]

2014-06-05 Thread Hector Marco
On 04/06/14 11:13, Jose Carlos Luna Duran wrote: In my opinion the drop of privs in bash was mostly a "help" measure for poorly written setuid programs executing system() calls. I don't think is the role of bash to do this as the problem that could be exploited by that would really be in the ori

Re: [FD] [oss-security] Bug in bash <= 4.3 [security feature bypassed]

2014-06-05 Thread lists
Jose Carlos Luna Duran writes: > In my opinion the drop of privs in bash was mostly a "help" measure > for poorly written setuid programs executing system() calls. I don't > think is the role of bash to do this ... True, but it is a slight help and I'm in favour of keeping it. > Correct me if I'

[FD] PHPBTTracker+ 2.2 SQL Injection

2014-06-05 Thread Enrico Cinquini
Advisory: PHPBTTracker+ 2.2 SQL Injection Disclosure by: BackBox Team Severity: High I. INTRODUCTION SQL Injection through User-Agent. User agent is an HTTP header section provided by appliaction used by the original clie

[FD] Scrumworks Pro authenticated arbitrary password reset

2014-06-05 Thread Brandon Perry
The latest available version of Scrumworks Pro does not perform proper authorization checks when users attempt to change passwords via the Java Web Start client. If you capture the request the web start client makes when changing the 'administrator' user's password, and substitute the JSESSIONID c

[FD] More OpenSSL issues

2014-06-05 Thread Jordan Urie
Ladies and Gentlemen, https://www.openssl.org/news/secadv_20140605.txt There's an MITM in there, and a potential for buffer over-runs. Patch up :-) Jordan -- Jordan R. Urie UP Technology Consulting, Inc. 1129 - 177A St. SW Edmonton, AB T6W 2A1 Phone: (780) 809-0932 www.uptech.ca

[FD] [RT-SA-2014-006] Directory Traversal in DevExpress ASP.NET File Manager

2014-06-05 Thread RedTeam Pentesting GmbH
Advisory: Directory Traversal in DevExpress ASP.NET File Manager During a penetration test RedTeam Pentesting discovered a directory traversal vulnerability in DevExpress' ASP.NET File Manager and File Upload. Attackers are able to read arbitrary files by specifying a relative path. Details =