Category: InfoSec
-
Everything is Vulnerable
Jake Kouns and I gave a talk that covered vulnerability databases: inherent problems, important issues, major players, research & rankings, and the future. The presentation was at CanSecWest 2005 in Vancouver.
-
Disclosure: bBlog 0.7.4 Multiple Vulnerabilities
[This was originally disclosed on the SourceForge bug tracker. VulnDB 15754, 15755, & 15756] in 0.7.4: The blog entry title field seems prone to cross site scripting (XSS) attacks. The blog/comment body text seems prone to XSS as well. In the index.php script, the postid variable seems prone to SQL injection attacks.
-
Predicting Vulnerabilities, Quotes and More
[This was originally published on the OSVDB blog.] Interesting article for several reasons. Below are some of the interesting quotes that stood out to me and may prove to be interesting topics. http://news.bbc.co.uk/1/hi/technology/3485972.stm Hackers exploit Windows patchesBy Mark WardLast Updated: Thursday, 26 February, 2004, 10:54 GMT “We have never had vulnerabilities exploited before the patch…
-
Days of Risk
[This was originally published on the OSVDB blog.] The last few months have seen a lot more talk about the “Days of Risk”. In short, vendors like Microsoft say the days of risk are the time between vulnerability information (or an exploit) being released and a system being patched. So if a new vulnerability is…
-
Random Comments on the Symantec Internet Threat Report 2005
[Originally posted to the ISN Mail List. Shortly after, modified for attrition.org. This was republished at The Age (AU) and the Sydney Morning Herald.] Some interesting stuff in the Symantec report that is being talked about in various news articles:http://www.zdnet.com.au/news/security/0,2000061744,39185387,00.htmhttp://uk.news.yahoo.com/050322/152/ferr7.htmlhttp://continuitycentral.com/news01804.htmhttp://www.macobserver.com/article/2005/03/23.4.shtml[..] The original Symantec release for this report:http://enterprisesecurity.symantec.com/content.cfm?articleid=1539 Symantec Internet Security Threat ReportTrends for July 04…
-
Disclosure: SecretSanta SecretSanta.php Malformed Input Remote Path Disclosure Weakness
[This was originally published on OSVDB, now gone, and touched up for style. VulnDB 12143. Discovered while trying to install the script to verify a researcher’s findings.] SecretSanta.phpUsing a ‘ in the account name, full name or group name generates the following error with full install path: Warning: mysql_fetch_row(): supplied argument is not a valid…
-
Book Review: Computer Security for the Home and Small Office
[The date of publication is not known.] Computer Security for the Home and Small OfficeThomas C. GreenePaperback – 405 pages (2004)$39.99 – Apress ISBN: 1-59059-316-2[Full Disclosure: I have been quoted by Greene for past articles in a friendly/professional capacity. He has also written articles that were accusatory to me and attrition.org in the past. Translated:…
-
Disclosure: Tabbrowser Preferences (TBP) Extension for Mozilla Cross-tab HTTP Referer Header Remote Information Disclosure
[This was originally published on the Mozilla bug tracker and touched up for style and mirrored on attrition.org. VulnDB 8323.] User-Agent: Firefox/0.9.2 (Windoze XP; U) [en]Build Identifier: Firefox/0.9.2 (Windows XP; U) [en] “Load URLs typed into the address bar in new tabs” is selected (not sure if this is part of Tabbrowser Preferences 0.6.5 extension…
-
Book Review: Cyber Crime
[The date of publication is not known.] Cyber CrimeHow to Protect Yourself from Computer CriminalsLaura E. Quarantiello0-936653-74-4, Tiare Publications/Limelight Books Part One: Chapter One – ‘Terrorism On Line: Inside Comptuer Crime’: Chapter one opens with defining computer crime, and does a decent (and fair) job of defining why hackers hack. “In the end, it all…
-
Book Review: Security Warrior
[The date of publication is not known.] Security WarriorCyrus Peikari & Anton ChuvakinPaperback – 581 pages (January, 2004)$44.95 – O’Reilly ISBN: 0-596-00545-8 Security Warrior is one of the latest books that attempts to cover hacking and security information in a way that appeals to all levels of the field. Most books of this nature will…