what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

shoeLace.txt

shoeLace.txt
Posted Dec 31, 2004

Very amusing spoof advisory regarding Shoe 1.0 - Remote Lace overflow.

tags | remote, overflow, spoof
systems | unix
SHA-256 | 709945f4e57a7a3cf52d5e11e1d11ba84989dedf3f066f3bef4688e5d846a4d7

shoeLace.txt

Change Mirror Download
 Shoe 1.0 - Remote Lace Overflow
--------------------------------------------

This Vulnerability is in reference to the new class of remote vulnerabilities
indicated in:
http://www.securityfocus.com/archive/1/385078/2004-12-19/2004-12-25/2
[Please read that first]

Discovery Credited To:
----------------------
freshman - 0x90.org
wxs - 0x90.org
txs - 0x90.org

Greets:
-------
Jonathan T. Rockway for being the smartest man alive.

Description:
------------
A remote shoe vulnerability exists that could allow for remote tripping and
possible exposure of sensitive data to the pavement.

Scope:
------
REMOTE

Severity:
---------
Hyper-Critical. This needs no explanation.

Vulnerability:
--------------
Failure to properly tie your shoe could result in tripping and a possible
broken face upon sudden deceleration when hitting the pavement.

Vulnerable Sizes:
-----------------
6 through 13. Other sizes may be vulnerable, but were unavailable for testing.

Exploitation:
-------------
You have a 100% secure walking system - you do not fall down, or trip over
your own laces. A remote attacker could determine your shoe size by reading
your livejournal FROM THE NETWORK and could MAIL YOU a shoe with extra long
laces. You put the shoe on without tying it properly and suddenly are exposed
to a REMOTE shoe vulnerability!

Fix:
----
Do not wear untrusted shoes sent to you. Other possible workarounds include
sandals (aka. flip-flops). These are a good work-around and are widely
available for those concerned about their security.

Vendor Notification:
--------------------
Vendors were not notified at the time of this writing. We have choosen not to
give advance notice because the fault is not always with the vendor of the
shoe as a REMOTE PERSON could SNAIL MAIL a LOCAL USER a vulnerable shoe.

We at 0x90.org believe that the users should be happy they were notified about
this. Imagine the mass destruction and chaos that would ensue if we unleashed
a REMOTE SHOE VULNERABILITY WORM into the wild. At this time we have choosen
not to do that, mostly because we can not afford all the stamps to mail
vulnerable shoes to the public.


Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close