More Patches released on Friday for you procrastinators: Ubuntu has updated kernel (multiple vulnerabilities) and moin (multiple vulnerabilities). Debian has updated netatalk (denial of service).

Fedora 9 has updated glpi (SQL injection problem) and gedit (python plugin path issue).

Fedora 10 has updated gedit (python plugin path issue).

rPath has updated sudo (privilege escalation).

http://www.Obnosis.com | (503)754-4452 http://l0calh0st.obnosis.com | http://wiki.obnosis.com | http://hackfest.obnosis.com | http://nuke.obnosis.com PLUG HACKFESTS - http://uat.edu Second Saturday Every Month@Noon - 3PM From: lisakachold@obnosis.com To: plug-devel@lists.plug.phoenix.az.us; plug-discuss@lists.plug.phoenix.az.us Subject: HackFest Security: Patch Procrastinators Anonymous February 14@UAT Date: Mon, 19 Jan 2009 04:30:42 +0000 Catch the Patch Procrastinators Recovery Group Saturday UAT.EDU Noon until 3PM February 14th Various important patches have only recently been released for various distros including Bind9, OpenSSL, cups & NTP for Ubuntu; Redhat5 Avahi (FC 10) and SquirrelMail. So we will demonstrate exploits available for these issues: 1) OpenSSL: (Using Debian) http://www.metasploit.com/users/hdm/tools/debian-openssl/ Brute Forcing Tools Include: http://www.milw0rm.com/exploits/5622 http://metasploit.com/users/hdm/tools/debian-openssl/debian_openssh_key_tester.rb OpenSSL: Examples will also apply to the recent issues with OpenSSL: Several functions inside OpenSSL incorrectly checked the result after calling the EVP_VerifyFinal function, allowing a malformed signature to be treated as a good signature rather than as an error. The issue affected the signature checks on DSA and ECDSA keys used with SSL/TLS for various mail systems and DNS systems built upon OpenSSL also. We will show an easy 'man in the middle' attack to present a malformed SSL/TLS signature from a certificate chain to a vulnerable client, bypassing validation and segway into a discussion of the MD5 Verisign cert issues. 2) NTP Spoofing: (Using Debian) NTP Spoofing has been a staple of DoS and remote root exploits since the 1990's. Usually NTP is selectively allowed to egress DMZ via stateful packet inspection (that will catch spoofed packets) via source and destination (or served via internal NTP daemons). It's common to spoof the NTP servers while sending exploitive packets. A new issue has been identified: http://www.debian.org/security/2009/dsa-1702 A simple exploit using netcat will be demonstrated: http://cybexin.blogspot.com/2009/01/introduction-to-netcat.html 3) Overview of BEef: http://www.bindshell.net/tools/beef We will also look at forensic image from the November Hackfest and discuss ways to protect (arp, VPN/VLAN, Switches, SELINUX) from the inevitable pwnership in a production or users system. We will not discuss squirrelmail, since it's only a XSS issue (similar to 9 out of 10 running versions of Apache httpd). We will not discuss Bind9 because it also relates to the OpenSSL malformed signature. Other PRNG type entropy issues with SSL exist, just waiting to be popularlized, so we will wait for the industry to continue to ignore this and other issues inherent in various protocols. Catch us on FreeNode IRC #PLUGLABS www.Obnosis.com | http://wiki.obnosis.com | http://hackfest.obnosis.com (503)754-4452 PLUG HACKFESTS - http://uat.edu Second Saturday of Each Month Noon - 3PM Windows Live™ Hotmail®: Chat. Store. Share. Do more with mail. See how it works. _________________________________________________________________ Windows Live™: E-mail. Chat. Share. Get more ways to connect. http://windowslive.com/explore?ocid=TXT_TAGLM_WL_t2_allup_explore_012009