Eine gute Stunde später fegte ihn ein markerschütternder Schrei beinahe
von der Schüssel. Draußen auf dem Gang rannten sich die Kollegen
gegenseitig über den Haufen. Zwei Assistentinnen aus dem fünften Stock
führten eine vollkommen hysterische Sonja zum Lift.
“Pleitgen! Pleitgen hat’s erwischt! Unglaublich! Innerhalb einer Woche…”
Ferdinand Leisch schaffte es, einen Blick in Pleitgens Büro zu werfen,
bevor der Notarzt eintraf. Pleitgen saß etwas zusammengesunken in seinem
uralten Ledersessel, die Augen waren halb geschlossen und ein schwaches
Lächeln umspielte seine dünnen Lippen. Die Lesebrille hatte er noch auf
der Nase.
What is affected?
- -----------------
The vulnerabilities described in this advisory affect implementations of the
Domain Name System (DNS) protocol. Many vendors include support for this protocol in their products and may be impacted to varying degrees, if at all.
[...]
Impact
- ------
If exploited, these vulnerabilities could cause a variety of outcomes including,
for example, a Denial-of-Service (DoS) condition. In most cases, they can expose
memory corruption, stack corruption or other types of fatal error conditions. Some of these conditions may expose the protocol to typical buffer overflow exploits, allowing arbitrary code to execute or the system to be modified.
Geschwindigkeit
bis zu 16 Seiten/Minute
Auflösung
600 x 600 dpi
Druck der 1. Seite
< 10 Sek.
Speicherkapazität
2 MB
Prozessor
Samsung SPGPm 150 MHz
Schnittstellen
USB 1.1
This evening we released IE7 Beta 2 at http://www.microsoft.com/ie. This release is not the preview or the update to the preview, but the real Beta 2 of IE7 for Windows XP SP2, Windows Server 2003 SP1, and Windows XP 64-bit Edition. Simply: please try it.
Software:
Firefox Web Browser
Tested:
Linux, Windows clients' version 1.5.0.2
Result:
Firefox Remote Code Execution and Denial of Service - Vendor contacted, no patch yet.
Problem:
A handling issue exists in how Firefox handles certain Javascript in js320.dll and xpcom_core.dll regarding iframe.contentWindow.focus(). By manipulating this feature a buffer overflow will occur.
Proof of Concept:
http://www.securident.com/vuln/ff.txt
Perhaps not surprisingly, there appears to be a vulnerability in how
Microsoft Internet Explorer handles (or fails to handle) certain
combinations of nested OBJECT tags. This was tested with MSIE
6.0.2900.2180.xpsp.040806-1825 and mshtml.dll 6.00.2900.2873
xpsp_sp2_gdr.060322-1613.
At first sight, this vulnerability may offer a remote compromise vector,
although not necessarily a reliable one. The error is convoluted and
difficult to debug in absence of sources; as such, I cannot offer a
definitive attack scenario, nor rule out that my initial diagnosis will be
proved wrong [*]. As such, panic, but only slightly.
Probably the easiest way to trigger the problem is as follows:
perl -e '{print "<STYLE></STYLE>\n<OBJECT>\nBork\n"x32}' >test.html
...this will (usually) cause a NULL pointer + fixed offset (eax+0x28)
dereference in mshtml.dll, the pointer being read from allocated but still
zeroed memory region.
The aforementioned condition is not exploitable, but padding the page with
preceeding OBJECT tag (and other tags), increasing the number of nested
OBJECTs, and most importantly, adding bogus 'type=' parameters of various
length to the final sequence of OBJECTs, will cause that dereference to
become non-NULL on many installations; then, a range of other interesting
faults should ensue, including dereferences of variable bogus addresses
close to stack, or crashes later on, when the page is reloaded or closed.
http://lcamtuf.coredump.cx/iedie2-1.html (eax=0x0, instant dereference)
http://lcamtuf.coredump.cx/iedie2-2.html (bogus esi on reload/leave)
http://lcamtuf.coredump.cx/iedie2-3.html (page fault on browser close)
http://lcamtuf.coredump.cx/iedie2-4.html (bogus esi on reload/leave)
From: Niels Braczek <[email protected]>
Newsgroups: de.comp.lang.php.datenbanken
Subject: Re: geschützte Website
Date: Fri, 21 Apr 2006 18:30:25 +0200
[Verschlüsselung und Hashes]
Generell gibt es *keine* sichere Methode, Daten vor unberechtigtem
Zugriff zu schützen, die von der vollständigen Vernichtung dieser Daten
verschieden ist. Man kann nur bestrebt sein, die Hürde so hoch zu legen,
dass der Gewinn in keiner Relation zum Aufwand steht.
User Interface
Enabled support for BitTorrent.
Added opera:config for managing preferences.
Enhanced pop-up blocker to detect more unwanted pop-ups.
Messaging and Newsfeeds
New account storage format. If you install over an existing profile, you will be prompted to convert all accounts into the new format. This will not require a re-index.
Added support for Atom 1.0.
Display
Added support for CSS 3 opacity.
Added support for CSS 3 attribute and UI selectors.
@import is now supported in user stylesheets.
Improved handling of tables, iframes, and BIDI in ERA.
Images
SVG support increased to SVG 1.1 basic.
Added support for YCCK and CMYK formats in JPEG images.