what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

shoeLace.txt

shoeLace.txt
Posted Dec 31, 2004

Very amusing spoof advisory regarding Shoe 1.0 - Remote Lace overflow.

tags | remote, overflow, spoof
systems | unix
SHA-256 | 709945f4e57a7a3cf52d5e11e1d11ba84989dedf3f066f3bef4688e5d846a4d7

shoeLace.txt

Change Mirror Download
 Shoe 1.0 - Remote Lace Overflow
--------------------------------------------

This Vulnerability is in reference to the new class of remote vulnerabilities
indicated in:
http://www.securityfocus.com/archive/1/385078/2004-12-19/2004-12-25/2
[Please read that first]

Discovery Credited To:
----------------------
freshman - 0x90.org
wxs - 0x90.org
txs - 0x90.org

Greets:
-------
Jonathan T. Rockway for being the smartest man alive.

Description:
------------
A remote shoe vulnerability exists that could allow for remote tripping and
possible exposure of sensitive data to the pavement.

Scope:
------
REMOTE

Severity:
---------
Hyper-Critical. This needs no explanation.

Vulnerability:
--------------
Failure to properly tie your shoe could result in tripping and a possible
broken face upon sudden deceleration when hitting the pavement.

Vulnerable Sizes:
-----------------
6 through 13. Other sizes may be vulnerable, but were unavailable for testing.

Exploitation:
-------------
You have a 100% secure walking system - you do not fall down, or trip over
your own laces. A remote attacker could determine your shoe size by reading
your livejournal FROM THE NETWORK and could MAIL YOU a shoe with extra long
laces. You put the shoe on without tying it properly and suddenly are exposed
to a REMOTE shoe vulnerability!

Fix:
----
Do not wear untrusted shoes sent to you. Other possible workarounds include
sandals (aka. flip-flops). These are a good work-around and are widely
available for those concerned about their security.

Vendor Notification:
--------------------
Vendors were not notified at the time of this writing. We have choosen not to
give advance notice because the fault is not always with the vendor of the
shoe as a REMOTE PERSON could SNAIL MAIL a LOCAL USER a vulnerable shoe.

We at 0x90.org believe that the users should be happy they were notified about
this. Imagine the mass destruction and chaos that would ensue if we unleashed
a REMOTE SHOE VULNERABILITY WORM into the wild. At this time we have choosen
not to do that, mostly because we can not afford all the stamps to mail
vulnerable shoes to the public.


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close