[NT] Ability Mail Server Stores Passwords in the Clear

From: SecuriTeam (support_at_securiteam.com)
Date: 06/16/03

  • Next message: SecuriTeam: "[NT] Path Disclosure Vulnerability Found in Aiglon Web Server"
    To: list@securiteam.com
    Date: 16 Jun 2003 14:24:40 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    Latest attack techniques.

    You're a pen tester, but is google.com still your R&D team?
    Now you can get trustworthy commercial-grade exploits and the latest
    techniques from a world-class research group.

    Learn more at http://www.coresecurity.com/promos/sit_e1,
    or call 617-399-6980

    - - - - - - - - -

      Ability Mail Server Stores Passwords in the Clear
    ------------------------------------------------------------------------

    SUMMARY

    <A HREF="http://www.code-crafters.com/abilitymailserver/index.html
    ">Ability Mail Server has "been designed to be small, fast, reliable,
    advanced and very feature rich. This powerful mail server is capable of
    running on both the Internet and a LAN (i.e. for either Internet or
    internal mail systems), bringing professional mail handling at a fraction
    of the normal price". Due to a vulnerability in the product, the usernames
    and passwords are stored by the product in clear text, allowing anyone
    with local access to gather sensitive usernames and passwords.

    DETAILS

    Vulnerable systems:
     * Ability Mail Server version 1.09

    Ability Mail Server stores all usernames and passwords in the file
    \Program Files\Code-Crafters\Ability Mail Server\config\accounts.dta in
    clear text. If a malicious user were to gain access to this file, they
    would have a list of all usernames and their associated passwords.

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:vulncode@yahoo.com> Ziv
    Kamir.

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[NT] Path Disclosure Vulnerability Found in Aiglon Web Server"