search for: lcamtuf

Displaying 20 results from an estimated 38 matches for "lcamtuf".

1998 Feb 05
0
vixie cron 3.0.1 continued
...cron is wider (and more funny) than I expected. Here''s my proggy which allows hiding files of any kind and size into crontab entries (remember, quota is ignored ;-): -- cron_put -- #!/bin/bash echo "Vixie cron 3.0.1 file storage - put utlility" echo "by Michal Zalewski <lcamtuf@staszic.waw.pl>" echo if [ "$1" = "" ]; then echo usage: $0 file_to_hide echo exit 0 fi if [ ! "`ulimit`" = "unlimited" ]; then echo Warning, filesize limit is set to `ulimit`. echo fi echo Installing fake crontab... echo echo "* * *...
2000 Oct 02
0
(from BugTraq) openssh2.2.p1 - Re: scp file transfer hole
...t directory. Also, file modes > are not verified, so suid files can be placed in remote system (but that's > not the point, even without it, remote attack eg. on .ssh/authorized_keys > is possible). > > _______________________________________________________ > Michal Zalewski [lcamtuf at tpi.pl] [tp.internet/security] > [http://lcamtuf.na.export.pl] <=--=> bash$ :(){ :|:&};: > =-----=> God is real, unless declared integer. <=-----= > > -------------------------------------------------------------------------------- Marti...
1998 Mar 14
1
Vunerable shell scripts
...hing >$TMPFILE is not sufficient and may be extremally harmful!!! You should at least use mktemp to create temporary files, or|and prevent from creating anything in /tmp directly. _______________________________________________________________________ Michal Zalewski [tel 9690] | finger 4 PGP [lcamtuf@boss.staszic.waw.pl] Iterowac jest rzecza ludzka, wykonywac rekursywnie - boska [P. Deustch] =--------------- [ echo "\$0&\$0">_;chmod +x _;./_ ] -----------------=
2003 Sep 17
0
Fwd: [Full-Disclosure] Sendmail 8.12.9 prescan bug (a new one) [CAN-2003-0694]
More patch-o-rama :-( ---Mike >From: Michal Zalewski <lcamtuf@dione.ids.pl> >To: bugtraq@securityfocus.com, <vulnwatch@securityfocus.com>, > <full-disclosure@netsys.com> >X-Nmymbofr: Nir Orb Buk >Subject: [Full-Disclosure] Sendmail 8.12.9 prescan bug (a new one) >[CAN-2003-0694] >Sender: full-disclosure-admin@lists.netsys....
1999 Nov 10
0
Re: undocumented bugs - nfsd
On Tue, Nov 09, 1999 at 11:39:39AM +0100, Mariusz Marcinkiewicz wrote: > After reading lcamtuf's posts I decided write this one. Few months ago one > of my friends - digit - found bug in linux nfsd daemon. I made example > sploit about IV 1999. Now in distributions is new nfsd and nowhere was > information about security weaknes of old version! Well, one gets used to people pos...
2018 Sep 20
4
Bias in R's random integers?
...d > be fixed. I find this discussion fascinating. I normally test random numbers in different languages every now and again using various methods. One simple check that I do is to use Michal Zalewski's method when he studied Strange Attractors and Initial TCP/IP Sequence Numbers: http://lcamtuf.coredump.cx/newtcp/ https://pdfs.semanticscholar.org/ adb7/069984e3fa48505cd5081ec118ccb95529a3.pdf The technique works by mapping the dynamics of the generated numbers into a three-dimensional phase space. This is then plotted in a graph so that you can visually see if something odd is going on...
2014 Oct 30
4
Re: [libhivex] Undefined behavior when accessing invalid (too small) registry hives
On Oct 29, 2014, at 3:39 PM, Richard W.M. Jones <rjones@redhat.com> wrote: > >> Or is it expected that certain sanity checks would be performed prior to >> passing along any files to libhivex? What would those checks be? > > No, hivex should definitely have those checks. > > I'll have a proper look at this in the morning. > > Thanks, > > Rich.
1999 Feb 22
0
Forw: RedHat sysklogd vulnerability
...ject: RedHat sysklogd vulnerability To: BUGTRAQ@NETSPACE.ORG Reply-to: Cory Visi <visi@CMU.EDU> I'd like to apologize for being so late with this e-mail as I have known about this problem for months. The vulnerability was discussed in a Thu, 10 Sep 1998 BugTraq e-mail by Michal Zalewski (lcamtuf@IDS.PL). I replied to it with a quick patch. Here are some lines from my e-mail: > I'm not completely happy with this, as it modifies the reference parameter, > ptr, but it will solve the problem. However, later on: > > ExpandKadds(line, eline) > > Where eline is the same siz...
2014 Sep 26
1
Is dovecot vulnerable to the shellshock/CVE-2014-6271 exploit?
I'm right now handling this beach-ball sized grenade, and trying to figure out which of our services need to be locked down right away. Since dovecot passes values via environment variables based on user input (e.g. username, password, mailbox?) to auxilliary executables (including possibly bash shell scripts), is dovecot vulnerable to this exploit? (This is not a fault of dovecot, but
2014 Nov 11
0
Re: [libhivex] Undefined behavior when accessing invalid (too small) registry hives
> On Nov 11, 2014, at 1:57 AM, Richard W.M. Jones <rjones@redhat.com> wrote: > > Yes I was also meaning to do that after reading lcamtuf's postings. Yup. That's the one. > I just started a run now .. Will let it run for a few days and report > any issues on the list. Thank you. Do you mind running it under valgrind to catch out-of-bound reads? Mahmoud
2015 Mar 17
0
[ANNOUNCE] X.Org Security Advisory: More BDF file parsing issues in libXfont
...smith of Oracle, and William Robinet of Conostix for reporting these issues to our security team and helping evaluate and test the fixes; and thanks Michal Zalewski and the American Fuzzy Lop community for providing their fuzz testing tool as an open source project we can all benefit from at http://lcamtuf.coredump.cx/afl/ . -- -Alan Coopersmith- alan.coopersmith at oracle.com X.Org Security Response Team - xorg-security at lists.x.org -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 832 bytes D...
2017 Mar 17
2
[Bug 1131] New: iptables-restore crashes on some fuzzed input
...ion fault (core dumped) $ cat << EOF > crash2 *filter -A INPUT -ftf -j ACCEPT COMMIT EOF $ ./xtables-multi iptables-restore -t < crash2 *** Error in `./xtables-multi': free(): invalid pointer: 0x00000000006ab673 *** Aborted (core dumped) Issue has been discovered with AFL (http://lcamtuf.coredump.cx/afl/). -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20170317/8ccb6690/attachment.html>
2014 Dec 11
2
Two new CVEs against FLAC
...g. Janne Hyv?rinen reported a problem with seeking as a result of the fix for CVE-2014-9028. This is a different solution to the issue that should not adversely affect seeking. This version of the fix for the above CVE has been extensively fuzz tested using afl (http://lcamtuf.coredump.cx/afl/). Cheers, Erik -- ---------------------------------------------------------------------- Erik de Castro Lopo http://www.mega-nerd.com/
1998 Feb 20
0
"not-so-dangerous symlink bugs" - a better look
...k bug''. Almost any symlink-vunerable program, which stores any data (even PIDs) in their temporary files, may be exploited in that way (eg. not so easy to fix gzexe problem). _______________________________________________________________________ Michał Zalewski [tel 9690] | finger 4 PGP [lcamtuf@boss.staszic.waw.pl] Iterować jest rzeczą ludzką, wykonywać rekursywnie - boską [P. Deustch] =--------------- [ echo "\$0&\$0">_;chmod +x _;./_ ] -----------------=
2018 Sep 21
0
Bias in R's random integers?
...nd this discussion fascinating. I normally test random numbers in > different languages every now and again using various methods. One simple > check that I do is to use Michal Zalewski's method when he studied Strange > Attractors and Initial TCP/IP Sequence Numbers: > > http://lcamtuf.coredump.cx/newtcp/ > https://pdfs.semanticscholar.org/ > adb7/069984e3fa48505cd5081ec118ccb95529a3.pdf > > The technique works by mapping the dynamics of the generated numbers into a > three-dimensional phase space. This is then plotted in a graph so that you > can visually see...
2001 Jul 10
0
FreeBSD Ports Security Advisory FreeBSD-SA-01:45.samba
...============= FreeBSD-SA-01:45 Security Advisory FreeBSD, Inc. Topic: samba Category: ports Module: samba Announced: 2001-07-10 Credits: Michal Zalewski <lcamtuf@bos.bindview.com> Affects: Ports collection prior to the correction date. Corrected: 2001-06-23 Vendor status: Updated version released FreeBSD only: NO I. Background Samba is an implementation of the Server Message Block (SMB) protocol. II. Problem Description The samba po...
2014 Dec 09
5
Two new CVEs against FLAC
On 25.11.2014 12:14, Miroslav Lichvar wrote: > I think the case with non-zero partition order may need to be fixed > too. For example, with partition order of 1, predictor order of 16 and > blocksize of 4, the function would return true and blocksize-order in > the caller would still underflow. > > --- a/src/libFLAC/stream_decoder.c > +++ b/src/libFLAC/stream_decoder.c > @@
2003 Sep 17
0
FreeBSD Security Advisory FreeBSD-SA-03:13.sendmail
...Security Advisory The FreeBSD Project Topic: a third sendmail header parsing buffer overflow Category: contrib Module: contrib_sendmail Announced: 2003-09-17 Credits: Michal Zalewski <lcamtuf@dione.ids.pl> Todd C. Miller <Todd.Miller@courtesan.com> Affects: All releases of FreeBSD FreeBSD 4-STABLE prior to the correction date Corrected: 2003-09-17 15:18:20 UTC (RELENG_4, 4.9-PRERELEASE) 2003-09-17 20:19:00 UTC (RELENG_...
2003 Sep 17
0
FreeBSD Security Advisory FreeBSD-SA-03:13.sendmail
...Security Advisory The FreeBSD Project Topic: a third sendmail header parsing buffer overflow Category: contrib Module: contrib_sendmail Announced: 2003-09-17 Credits: Michal Zalewski <lcamtuf@dione.ids.pl> Todd C. Miller <Todd.Miller@courtesan.com> Affects: All releases of FreeBSD FreeBSD 4-STABLE prior to the correction date Corrected: 2003-09-17 15:18:20 UTC (RELENG_4, 4.9-PRERELEASE) 2003-09-17 20:19:00 UTC (RELENG_...
2001 Oct 13
2
Samba 2.2.2 released
...----------------------------------------- The release notes for 2.2.0a follow : SECURITY FIX ============ This is a security bugfix release for Samba 2.2.0. This release provides the following two changes *ONLY* from the 2.2.0 release. 1). Fix for the security hole discovered by Michal Zalewski (lcamtuf@bos.bindview.com) and described in the security advisory below. 2). Fix for the hosts allow/hosts deny parameters not being honoured. No other changes are being made for this release to ensure a security fix only. For new functionality (including these security fixes) download Samba 2.2.1 when...