Re: [FD] [oss-security] CVE request:Lynx invalid URL parsing with '?'

2016-11-05 Thread Michal Zalewski
> Actually, it does parse correctly. Go read RFC 1738. IIRC, RFC 3986 "fixes" that, and so does https://url.spec.whatwg.org/. /mz ___ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: ht

Re: [FD] Safari Address Spoofing (How We Got It)

2015-06-02 Thread Michal Zalewski
> If you change "http://1.2.3.4/"; in your Safari code: > some URL in the real world(for example, dailymail.co.uk). > Your code won't work(page of target domain is simply loaded). Sure, but that's pretty obvious. /mz ___ Sent through the Full Disclosur

Re: [FD] Safari Address Spoofing (How We Got It)

2015-05-31 Thread Michal Zalewski
Well... http://lcamtuf.blogspot.com/2010/06/yeah-about-that-address-bar-thing.html On Thu, May 28, 2015 at 10:47 PM, David Leo wrote: > Proof of concept: > http://www.deusen.co.uk/items/iwhere.9500182225526788/ > It works on fully patched versions of iOS and OS X. > How it works: > Just keep try

Re: [FD] Mysterious CVE-2008-568 (Solaris)

2015-04-30 Thread Michal Zalewski
> to reference this issue at all. Does anyone know if it has a different > CVE number or what happened here? Looks like: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5689 ___ Sent through the Full Disclosure mailing list https://nmap.org/mailm

Re: [FD] several issues in SQLite (+ catching up on several other bugs)

2015-04-19 Thread Michal Zalewski
> Clang and its analyzers found a number of issues a couple of years > ago. As far as I know, the results were dismissed. See "Clang 3.3 and > Scan-Build results", Well, I can kinda sympathize. Somebody took one of my OSS projects (p0f) and ran it through a static analyzer a while ago (the analyze

Re: [FD] several issues in SQLite (+ catching up on several other bugs)

2015-04-19 Thread Michal Zalewski
> Richard and the team certainly have been busy bees: > https://www.sqlite.org/src/timeline?n=152&y=ci&v=0&ym=2015-04&t=trunk Yup. In addition to the crashes, I also sent them probably around 50-60 assert failures in debug builds, at their request. Most of them are probably not security relevant,

[FD] several issues in SQLite (+ catching up on several other bugs)

2015-04-14 Thread Michal Zalewski
SQLite is probably the most popular embedded database in use today; it is also known for being very well-tested and robust. Because of its versatility, SQLite sometimes finds use as the mechanism behind SQL-style query APIs that are exposed between privileged execution contexts and less-trusted co

Re: [FD] CVE-2014-9330: Libtiff integer overflow in bmp2tiff

2014-12-22 Thread Michal Zalewski
> Fuzzing bmp2tiff, using the afl-fuzzer, revealed an integer overflow issue > related to the dimensions of the input BMP image. It's probably worth noting that although the bundled utilities are pretty buggy, there are also several bugs affecting the libtiff library itself that can be hit with af

Re: [FD] The Misfortune Cookie Vulnerability

2014-12-18 Thread Michal Zalewski
> See http://mis.fortunecook.ie for the rest. I think you might have accidentally pasted the wrong link. This one doesn't seem to contain additional information. Cheers, /mz ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/list

[FD] on Linux, 'less' can probably get you owned

2014-11-23 Thread Michal Zalewski
Many Linux distributions ship with the 'less' command automagically interfaced to 'lesspipe'-type scripts, usually invoked via LESSOPEN. This is certainly the case for CentOS and Ubuntu. Unfortunately, many of these scripts appear to call a rather large number of third-party tools that likely have

[FD] vulnerabilities in libbfd (CVE-2014-beats-me)

2014-10-26 Thread Michal Zalewski
Yo, Many shell users, and certainly a lot of the people working in computer forensics or other fields of information security, have a habit of running /usr/bin/strings on binary files originating from the Internet. Their understanding is that the tool simply scans the file for runs of printable ch

Re: [FD] the other bash RCEs (CVE-2014-6277 and CVE-2014-6278)

2014-10-01 Thread Michal Zalewski
> Can I quote you on: > PS. There are no other bugs in bash. There's no proof I ever said that! /mz ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure

Re: [FD] Critical bash vulnerability CVE-2014-6271

2014-09-25 Thread Michal Zalewski
> Worse that heartbleed? In what way? It doesn't have a logo, so it's a bit better in my book. But seriously, yup, it's probably worse - it likely affects more sites and trivially gives you remote shell. I have written down some technical details about the issue and the problems with all the pat

[FD] Uninit memory disclosure via truncated images in Firefox

2014-09-02 Thread Michal Zalewski
Yello, The recent release of Firefox 32 fixes another interesting image parsing issue found by afl [1]: following a refactoring of memory management code, the past few versions of the browser ended up using uninitialized memory for certain types of truncated images, which is easily measurable with

[FD] (kind of) new tool: american fuzzy lop

2014-08-04 Thread Michal Zalewski
Hey all, Since I haven't really ever properly done it, i wanted to "officially" announce american fuzzy lop, a novel instrumentation-driven fuzzer that, among other things, had some luck finding a bunch of fairly interesting image parsing security issues (e.g., CVE-2013-6629, CVE-2013-6630). http

Re: [FD] Back To The Future: Unix Wildcards Gone Wild

2014-06-27 Thread Michal Zalewski
> What kind of response are you expecting from the various distros on this > exactly? Having "noglob" option enabled by default on all the shells on > the system? rm /bin/rm ___ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listi

Re: [FD] Back To The Future: Unix Wildcards Gone Wild

2014-06-26 Thread Michal Zalewski
> We wanted to inform all major *nix distributions via our responsible > disclosure policy about this problem before posting it I'm not sure how to put it mildly, but I think you might have been scooped on this some 1-2 decades ago... Off the top of my head, there's a rant about this behavior in

[FD] Boolean algebra and CSS history theft

2014-06-24 Thread Michal Zalewski
OK, this is more fun than any immediate risk... Those of you who follow web security topics probably remember that until mid-2010, you could extract very substantial chunks of one's browsing history by applying distinctive styling to thousands of off-screen :visited links and then reading that inf

Re: [FD] What do you think of Trollc?

2014-05-29 Thread Michal Zalewski
> I could distill that to layman's terms: > "Hurting someone else and making money at their expense." Well, kind of, but that's essentially the definition of all short-term stock trading: you're betting that somebody else is wrong and want to profit from their loss. /mz _

Re: [FD] What do you think of Trollc?

2014-05-28 Thread Michal Zalewski
> I'd be interested to see analyses of short term affects of breaches. A friend of mine pointed me to this paper: http://www.heinz.cmu.edu/~rtelang/tse_published.pdf I have issues with the methodology - most notably, the study covers only 150 bugs out of thousands qualifying ones; half of them f

Re: [FD] What do you think of Trollc?

2014-05-28 Thread Michal Zalewski
> Among other according to > www.sfgate.com/business/article/Investors-undeterred-by-data-breaches-5505309.php > seems that also after data breaches like the Targets one there aren'tlong > term impact on stock markets. Well and the business plan here is not to cause breaches, right?;-) /mz _

Re: [FD] What do you think of Trollc?

2014-05-27 Thread Michal Zalewski
> vulnerabilities to the public. For this I need help getting the filing fees > necessary to incorporate a hedge fund. I want to continue bringing issues > in companies that put you at risk to light, and short the stocks of those > companies when I do so. It's practically unheard of to see stocks

Re: [FD] Beginners error: Hewlett-Packards driver software executes rogue binary C:\Program.exe

2014-05-21 Thread Michal Zalewski
> 90 out of 100 security flaws in the past years where from the > category "hy should i bother about this and that, it is unlikely" If possible, I'd like to hear more about this. /mz ___ Sent through the Full Disclosure mailing list http://nmap.org/mai

Re: [FD] Beginners error: Hewlett-Packards driver software executes rogue binary C:\Program.exe

2014-05-21 Thread Michal Zalewski
> the existence of "C:\Program.exe" must not have any bad affect > for any random installer not intending to execute this Sounds like a good goal. The installer probably also shouldn't play obscene messages via PC speaker. If it did, it would be undesirable and probably considered a bug. Now, in

Re: [FD] Legitimacy of new Heartbleed exploit?

2014-04-25 Thread Michal Zalewski
> It's bullshit. They say: 'A missing bounds check in the handling of the > variable "DOPENSSL_NO_HEARTBEATS"'. That's not a variable, the "D" is > not actually part of the name, and it's a compile-time macro that > configures whether heartbeats will be compiled in or not. And because > it's a comp

Re: [FD] heartbleed OpenSSL bug CVE-2014-0160

2014-04-11 Thread Michal Zalewski
> http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html Uh huh. And here's a fairly unequivocal rebuttal: http://icontherecord.tumblr.com/post/82416436703/statement-on-bloomberg-news-story-that-nsa-knew There's not a whole lot of wiggle room. It's p

Re: [FD] heartbleed OpenSSL bug CVE-2014-0160

2014-04-11 Thread Michal Zalewski
> 1. inclusive of [1..3] above > 2. replace all operating systems > 3. audit or replace all user data And also burn the hardware, given that if you're assuming the worst-case scenario, all your firmware is now replaced with that of Roomba. I mean, it's a very cool bug. I'm jealous of Neel. But

Re: [FD] heartbleed OpenSSL bug CVE-2014-0160

2014-04-10 Thread Michal Zalewski
> http://m.smh.com.au/it-pro/security-it/man-who-introduced-serious-heartbleed-security-flaw-denies-he-inserted-it-deliberately-20140410-zqta1.html "Man who introduced serious 'Heartbleed' security flaw denies he inserted it deliberately" Wow, we're climbing to some new levels here. /mz ___

Re: [FD] heartbleed OpenSSL bug CVE-2014-0160

2014-04-09 Thread Michal Zalewski
> How realistic is it that an attacker would be able to glean passwords through > this vulnerability? Highly. > Programatically searching through 64k memory dumps for > certificates seems plausible, but looking for passwords does not. A password > is > of no pre-determined length or format. HTT

Re: [FD] Security flaw in Full Disclosure mailing list

2014-04-02 Thread Michal Zalewski
> -table.append(fmt % (listaddr, password, optionsurl)) > +table.append(fmt % (listaddr, "", optionsurl)) That doesn't work if my password is "". /mz ___ Sent through the Full Disclosure mailing list http