Dailydave mailing list archives
Re: Anonymized posting.
From: Dave Aitel <dave () immunitysec com>
Date: Sun, 23 May 2004 18:23:55 -0400
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Personally, I think it's weird how K-otik (the french exploit repository) removed the headers from these codes. I'm not sure what the bizarre motivation on that is. Deb Hale posted this: http://isc.sans.org/diary.php?date=2004-05-21 """ *alert tcp $EXTERNAL_NET any -> $HOME_NET 2401 (msg:"CVS server heap overflow attempt (target Linux)"; flow:to_server,established; content:"|45 6e 74 72 79 20 43 43 43 43 43 43 43 43 43 2f 43 43|"; offset:0; depth:20; dsize: >512; threshold: type limit, track by_dst, count 1, seconds 60 ; sid:1000000; rev:1; classtype:attempted-admin;) """ I typically find the SANS diary to only occasionally halfway understand what they're talking about. I think it's funny they call themselves handlers instead of "people without computer science degrees or any knowledge of computer security trying desperately to learn how to read shellcode and informing a legion of other people about vulnerabilities, worms, and exploits a. la. the blind and deaf leading the blind". I guess that was too long to put before "On Duty" in their signatures. ** As an example, here's her header: Follow-up to May 19th Handlers Diary: *The cvs exploit published yesterday has seen used multiple times. PATCH NOW!. The cvs main homepage (cvshome.org) appears to be down. However, you should still be able to obtain patches from mirrors.** That seems silly. What we have here is a potential (aka nearly certain) corruption of every open source source tree. CVS itself being vulnerable is about .00001 of the problem. Warning about the CVS exploit being used now is like sitting around in Pompei after Vesuvius warning about a heavy pollen day. And, as various customers can tell you, those SNORT rules won't detect CANVAS. Dave Aitel Immunity, Inc. Someone wrote: (Anonymized Posting) | http://packetstormsecurity.org/0405-exploits/cvs_solaris_HEAP.c | http://packetstormsecurity.org/0405-exploits/cvs_linux_freebsd_HEAP.c | | | cvshome.org is still offline, and automated exploits are publically | available. Patches do very little good when the vendor cannot | keep the distribution point online. | | These obviously were not written post-publication of CAN-2004-0396. | They were infact written prior to the publication of | CAN-2003-0015. Makes you wonder what good the publication of either | bug has done. | | If security is a race condition, the good guys have just taken a | beating. | | Whoever they are. _______________________________________________ Dailydave mailing list Dailydave () lists immunitysec com http://www.immunitysec.com/mailman/listinfo/dailydave -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFAsSR6zOrqAtg8JS8RAiyGAKDf7gAeaeMTPABL9Lf6NB8tHf+ReQCg3cva V+IjJpScVIiz1mpZqsvU7Q8= =M11T -----END PGP SIGNATURE----- _______________________________________________ Dailydave mailing list Dailydave () lists immunitysec com http://www.immunitysec.com/mailman/listinfo/dailydave
Current thread:
- Anonymized posting. Dave Aitel (May 14)
- <Possible follow-ups>
- Anonymized posting. Dave Aitel (May 23)
- Re: Anonymized posting. Florian Weimer (May 23)
- Re: Anonymized posting. Dave Aitel (May 23)
