Announcement

Collapse
No announcement yet.

RIAA....what do u think of this crap...

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • RIAA....what do u think of this crap...

    To: BugTraq
    Subject: Local/remote mpg123 exploit
    Date: Jan 13 2003 6:23PM
    Author: <gobbles@hushmail.com>
    Message-ID: <200301131823.h0DINJbE014752@mailserver3.hushmail. com>


    -----BEGIN PGP SIGNED MESSAGE-----

    ___ ___ ___ ___ _ ___ ___ ___ ___ ___ _ _ ___ ___ _______
    / __|/ _ \| _ ) _ ) | | __/ __| / __| __/ __| | | | _ \_ _|_ _\ \ / /
    | (_ | (_) | _ \ _ \ |__| _|\__ \ \__ \ _| (__| |_| | /| | | | \ V /
    \___|\___/|___/___/____|___|___/ |___/___\___|\___/|_|_\___| |_| |_|
    "Putting the honey in honeynet since '98."

    Introduction:
    Several months ago, GOBBLES Security was recruited by the RIAA (riaa.org)
    to invent, create, and finally deploy the future of antipiracy tools. We
    focused on creating virii/worm hybrids to infect and spread over p2p nets.
    Until we became RIAA contracters, the best they could do was to passively
    monitor traffic. Our contributions to the RIAA have given them the power
    to actively control the majority of hosts using these networks.

    We focused our research on vulnerabilities in audio and video players.
    The idea was to come up with holes in various programs, so that we could
    spread malicious media through the p2p networks, and gain access to the
    host when the media was viewed.

    During our research, we auditted and developed our hydra for the following
    media tools:
    mplayer (www.mplayerhq.org)
    WinAMP (www.winamp.com)
    Windows Media Player (www.microsoft.com)
    xine (xine.sourceforge.net)
    mpg123 (www.mpg123.de)
    xmms (www.xmms.org)

    After developing robust exploits for each, we presented this first part of
    our research to the RIAA. They were pleased, and approved us to continue
    to phase two of the project -- development of the mechanism by which the
    infection will spread.

    It took us about a month to develop the complex hydra, and another month to
    bring it up to the standards of excellence that the RIAA demanded of us. In
    the end, we submitted them what is perhaps the most sophisticated tool for
    compromising millions of computers in moments.

    Our system works by first infecting a single host. It then fingerprints a
    connecting host on the p2p network via passive traffic analysis, and
    determines what the best possible method of infection for that host would
    be. Then, the proper search results are sent back to the "victim" (not the
    hard-working artists who p2p technology rapes, and the RIAA protects). The
    user will then (hopefully) download the infected media file off the RIAA
    server, and later play it on their own machine.

    When the player is exploited, a few things happen. First, all p2p-serving
    software on the machine is infected, which will allow it to infect other
    hosts on the p2p network. Next, all media on the machine is cataloged, and
    the full list is sent back to the RIAA headquarters (through specially
    crafted requests over the p2p networks), where it is added to their records
    and stored until a later time, when it can be used as evidence in criminal
    proceedings against those criminals who think it's OK to break the law.

    Our software worked better than even we hoped, and current reports indicate
    that nearly 95% of all p2p-participating hosts are now infected with the
    software that we developed for the RIAA.

    Things to keep in mind:
    1) If you participate in illegal file-sharing networks, your
    computer now belongs to the RIAA.
    2) Your BlackIce Defender(tm) firewall will not help you.
    3) Snort, RealSecure, Dragon, NFR, and all that other crap
    cannot detect this attack, or this type of attack.
    4) Don't **** with the RIAA again, scriptkids.
    5) We have our own private version of this hydra actively
    infecting p2p users, and building one giant ddosnet.

    Due to our NDA with the RIAA, we are unable to give out any other details
    concerning the technology that we developed for them, or the details on any
    of the bugs that are exploited in our hydra.

    However, as a demonstration of how this system works, we're providing the
    academic security community with a single example exploit, for a mpg123 bug
    that was found independantly of our work for the RIAA, and is not covered
    under our agreement with the establishment.

    Affected Software:
    mpg123 (pre0.59s)
    mp3 linux player decoder mpg123 mp2 mp1 mpeg audio solaris hpux layer3 layer2 layer1 aix freebsd bsdos sgi ultrix os2 netbsd mint windows esd 3dnow pentium optimized nas alpha dec sparc alsa oss mips ppc java sunos fast free source unix cool frontend


    Problem Type:
    Local && Remote

    Vendor Notification Status:
    The professional staff of GOBBLES Security believe that by releasing our
    advisories without vendor notification of any sort is cute and humorous, so
    this is also the first time the vendor has been made aware of this problem.
    We hope that you're as amused with our maturity as we are. ;PpPppPpPpPPPpP

    Exploit Available:
    Yes, attached below.

    Technical Description of Problem:
    Read the source.

    Credits:
    Special thanks to stran9er@openwall.com for the ethnic-cleansing shellcode.
    -----BEGIN PGP SIGNATURE-----
    Version: Hush 2.2 (Java)
    Note: This signature can be verified at https://www.hushtools.com/verify

    wlwEARECABwFAj4jBA0VHGdvYmJsZXNAaHVzaG1haWwuY29tAA oJEBzRp5chmbAP4gwA
    oKmMyRIxA74KZfAVv3MsEBKCZxRMAJsFFhywKWzMoiT/Qiy4FV+r1inukA==
    =OjMp
    -----END PGP SIGNATURE-----



    [ attachment: (application/octet-stream) ]

    -----BEGIN PGP SIGNATURE-----
    Version: Hush 2.2 (Java)
    Note: This signature can be verified at https://www.hushtools.com/verify

    wj8DBQA+IwO0HNGnlyGZsA8RAuusAJ49gGSCJzKlRpn+7b9vd+ GYydWzUQCgjq3Ofe2n
    WBnlQNf4GeyaFTit5N0=
    =RBjc
    -----END PGP SIGNATURE-----



    --------------------------------------------------------------------------------
    Why is it called tourist season, if we can't shoot at them?

  • #2
    It has written 'HOAX' all over it, if you ask me.

    Of course, it does raise attention to possible buffer overflow problems in media players which are a very true reality.

    Comment


    • #3
      I'd love if it was true, finally some new action in the p2p battle However i believe it is not true.
      no matrox, no matroxusers.

      Comment


      • #4
        I'm with dZeus on this one.
        Main: Dual Xeon LV2.4Ghz@3.1Ghz | 3X21" | NVidia 6800 | 2Gb DDR | SCSI
        Second: Dual PIII 1GHz | 21" Monitor | G200MMS + Quadro 2 Pro | 512MB ECC SDRAM | SCSI
        Third: Apple G4 450Mhz | 21" Monitor | Radeon 8500 | 1,5Gb SDRAM | SCSI

        Comment


        • #5
          Sounds like a hoax to me.

          Comment


          • #6
            Scaremongering.
            Blah blah blah nick blah blah confusion, blah blah blah blah frog.

            Comment


            • #7
              The RIAA is stupid,
              but not supid enough to commit millions of felonys.
              chuck
              Chuck
              秋音的爸爸

              Comment


              • #8
                At least not at the same time.

                Comment


                • #9
                  Judging by the wording it aint real, I would have thought someone working on such a project for RIAA would be a bit more professional
                  When you own your own business you only have to work half a day. You can do anything you want with the other twelve hours.

                  Comment


                  • #10
                    Vulnerabilities...

                    In...

                    Winamp?

                    Umm... I'm unaware of it being technologically POSSIBLE to exploit a vulnerability in Winamp and thus take over a client machine. Sorry. Winamp doesn't have permission to open ports to the outside world unless it's calling up CDDB.

                    HOAX.

                    Lies, falderal, and claptrap.

                    - Gurm
                    The Internet - where men are men, women are men, and teenage girls are FBI agents!

                    I'm the least you could do
                    If only life were as easy as you
                    I'm the least you could do, oh yeah
                    If only life were as easy as you
                    I would still get screwed

                    Comment


                    • #11
                      older versions of winamp had an buffer overflow problem (id3v2 tags), i don't think it was exploitable in real world situations though. at least i never heard of an exploit.
                      no matrox, no matroxusers.

                      Comment


                      • #12
                        Gurm, why are you so completely in love with Microsoft? It seems they can never do wrong in your eyes, and are virtuous beyond compare. Whenever they are mentioned you leap to their defense with the fervent loyalty of a devoted lapdog. WHY??

                        Comment


                        • #13
                          He did not support Microsoft in this case.

                          Comment


                          • #14
                            I like Microsoft becuase they keep me employed sorting there software out.
                            Chief Lemon Buyer no more Linux sucks but not as much
                            Weather nut and sad git.

                            My Weather Page

                            Comment


                            • #15
                              Originally posted by KvHagedorn
                              Gurm, why are you so completely in love with Microsoft? It seems they can never do wrong in your eyes, and are virtuous beyond compare. Whenever they are mentioned you leap to their defense with the fervent loyalty of a devoted lapdog. WHY??
                              Remember this thread?
                              Read it!
                              If there's artificial intelligence, there's bound to be some artificial stupidity.

                              Jeremy Clarkson "806 brake horsepower..and that on that limp wrist faerie liquid the Americans call petrol, if you run it on the more explosive jungle juice we have in Europe you'd be getting 850 brake horsepower..."

                              Comment

                              Working...
                              X