lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: thegusto22 at hotmail.com (Lance Gusto)
Subject: Multiple Backdoors found in eEye Products
	(IRISand SecureI


Hey Marky Mark and the Funky Bunch,


I will make this short and sweet (I know you have some hair dying to 
perform).
If you have no backdoors in your products then I guess you have nothing to 
worry about... :)


I would have a real "debate" with you, but your clearly UNARMED. :)


P.S:
I have to say your products are (not) great, they *really* (un)secure 
networks.
Your company is also the leading authority on (pseudo) security.... 
Vulnerability
is (not) over!.

Personally I should say: "Lose the weight and you just might gain a clue." 
:)

Squeeze through Mr. Marky Mark (CHO)



>From: "Marc Maiffret" <mmaiffret@...e.com>
>To: "Lance Gusto" Date: Wed, 29 Dec 2004 17:33:11 -0800
>
>Hi Lance Gusto,
>
>It is really interesting that someone with such a disdain for my company
>would go out of their way to spam out an email about a supposed backdoor
>within our products, choose not to contact us ahead of time, and then
>provide no real details to prove your claim... Ahhh but wait, you chose
>not to provide any details because you're a "good guy". As you said:
>"Unfortunately, we can't release the "exploits" publicly due to the
>severity of these flaws." Right.
>
>The reason you could not provide any real details about these backdoors
>are because there are no backdoors in Iris nor SecureIIS.
>
>While I would not wish to give someone like you the time of day nor 15
>minutes of infamy, eEye does take every security claim very seriously.
>We have performed an audit of SecureIIS and Iris code to re-verify what
>we already knew, that there are no backdoors in either of them.
>
>It is quite possible that you downloaded fake warez versions of our
>products from peer-to-peer networks which someone might have put there
>to trick people and put backdoors on their systems. However, if such
>warez product versions existed they would not be from eEye as we do not
>distribute our software on peer-to-peer networks nor recommend people
>downloading warez versions from there.  Get your warez from a trusted
>distributor. ;-) If you would have contacted us we could have saved you
>the embarrassment... But then you are sending emails from Hotmail
>through a proxy at a university in Germany so I seriously doubt you care
>if your persona "Lance Gusto" gets embarrassed on public mailing lists.
>
>
>These backdoors are as much of a reality as Santa Claus but then you
>seem to be childish enough that you probably still believe in the jolly
>red man. Maybe next you can follow-up your humors eMail with a spoofed
>advisory about a backdoor you found in Rudolph "the red nosed reindeer".
>At least then you could promote yourself from being a coward to a
>comedian.
>
>Thank you, please drive through.
>
>Signed,
>Marc Maiffret
>Chief Hacking Officer
>eEye Digital Security
>T.949.349.9062
>F.949.349.9538
>http://eEye.com/Blink - End-Point Vulnerability Prevention
>http://eEye.com/Retina - Network Security Scanner
>http://eEye.com/Iris - Network Traffic Analyzer
>http://eEye.com/SecureIIS - Stop known and unknown IIS vulnerabilities
>
>Important Notice: This email is confidential, may be legally privileged,
>and is for the intended recipient only. Access, disclosure, copying,
>distribution, or reliance on any of it by anyone else is prohibited and
>may be a criminal offense.  Please delete if obtained in error and email
>confirmation to the sender. P.S. I'm going to tell you this for your own
>benefit, your email was dope as hell especially since you faked 90
>percent of it. What you need to do is practice on your freestyle before
>you come up missing like triple m's police file.
>
>| -----Original Message-----
>| From: full-disclosure-bounces@...ts.netsys.com
>| [mailto:full-disclosure-bounces@...ts.netsys.com] On Behalf
>| Of Lance Gusto
>| Sent: Tuesday, December 28, 2004 8:12 PM
>| To: vuln-dev@...urityfocus.com;
>| ntbugtraq@...tserv.ntbugtraq.com; bugs@...uritytracker.com;
>| full-disclosure@...ts.netsys.com;
>| news-editor@...urityfocus.com; press@...-security.org
>| Subject: [Full-Disclosure] Multiple Backdoors found in eEye
>| Products (IRISand SecureIIS)
>|
>| Multiple Backdoors found in eEye Products (IRIS and
>| SecureIIS) L. Gusto <thegusto22@...mail.com>
>|
>|
>| Summary:
>|
>| During meticulous testing of both eEye's IRIS and SecureIIS
>| products, we (my testing team) have discovered multiple
>| backdoors in the latest of both mentioned products and some
>| older versions we could acquire.
>|
>|
>| These backdoors are very cleverly hidden (kudos to the
>| authors), I personally don't condone illegally backdooring
>| commercial products, and personally I don't think much of
>| eEye but I must give credit to where credit is due.
>|
>|
>| We have tested IRIS 3.7 and up they all appear to have a backdoor.
>| We have verified the IRIS backdoor doesn't exist in versions
>| prior to 3.0
>|
>|
>| We have tested SecureIIS 2.0 and up they all appear to have a
>| backdoor.
>| We have verified that SecureIIS 1.x series does not have this
>| specific backdoor.
>|
>| Bringing the backdoors to light:
>|
>| After long testing we discovered the exact sequences used to
>| active the backdoor. Unfortunately, we can't release the
>| "exploits" publically due to the severity of these flaws. But
>| incomplete examples will be given.
>|
>|
>|
>| The IRIS Backdoor:
>|
>| This one is quite interesting. We have discovered that
>| sending a specifically crafted UDP datagram to a IRIS host
>| *directly* (not through the wire or to host on the network
>| segment) with certain IP options set and a certain magic
>| value at a undisclosed offset in the payload will bind a
>| shell to the source port specified in the UDP datagram.
>|
>| [snip]
>|
>|
>| The SecureIIS Backdoor:
>|
>| The SecureIIS backdoor was alot easier to discover but very
>| well placed. The SecureIIS backdoor is triggered by a
>| specifically crafted HTTP HEAD request. Here is a incomplete
>| layout of how to exploit this:
>|
>|
>| HEAD /<24 byte constant string>/PORT_ADDRESS.ASP HTTP/1.1
>|
>| PORT 		- Will be the port to bind a shell.
>| ADDRESS		- Address for priority binding (0 - For any).
>|
>|
>| [snip]
>|
>|
>|
>| Local Deduction:
>|
>| There are a two possiblilites here, either eEye's code has
>| been altered by some attacker or this has been sanctioned by
>| the company (or at least the developers were fully aware of this).
>|
>|
>|
>| Conclusion:
>|
>| It is very very shameful that a somewhat reputable like eEye
>| is acting in a very childish, unprofessional manner. I figure
>| that is why the code is closed source. There are several
>| active exploits available that I (the author of this
>| advisory) didn't create floating around. The only logical
>| solution will be to not use the mentioned eEye products for
>| the time being or at least downgrade to the non-backdoored versions.
>|
>| We will be investigation eEye's Blink Product for any
>| clandestine backdoors.
>|
>| _________________________________________________________________
>| FREE pop-up blocking with the new MSN Toolbar - get it now!
>| http://toolbar.msn.click-url.com/go/onm00200415ave/direct/01/
>|
>| _______________________________________________
>| Full-Disclosure - We believe in it.
>| Charter: http://lists.netsys.com/full-disclosure-charter.html
>|

_________________________________________________________________
FREE pop-up blocking with the new MSN Toolbar – get it now! 
http://toolbar.msn.click-url.com/go/onm00200415ave/direct/01/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ