Martin DiViaio on Fri, 2 May 2003 08:43:10 -0400 |
I once managed to convince an UW-IMAP server to dump the system password file. I used no special tricks, just standard IMAP commands. While this wasn't the shadow password file, it was still a complete list of users on the box. Admittedly, this can be easily corrected by hacking the source code to force a user into their mailstore but to me, it's a problem at the protocol level that even allows this. (Also, such a hack violates the IMAP specification.) -- GPG Fingerprint: C900 18EF 0C36 4EAF A93C F073 85D4 8B3C F3D8 077B On the 30th day of April in the year 2003 you wrote: > Date: Wed, 30 Apr 2003 23:04:34 -0400 > From: Michael C. Toren <mct@toren.net> > To: plug@lists.phillylinux.org > X-Spam-Status: No, hits=-0.7 required=5.0 > tests=IN_REP_TO,REFERENCES,SPAM_PHRASE_00_01,X_AUTH_WARNING > version=2.44 > Subject: Re: [PLUG] pop3 server? > > > IMAP has some serious security problems at the protocol level that don't > > look like they are going to get fixed anytime soon. (I'm not talking about > > the fact that it's a clear text protocol.) > > Can you cite any specific examples? > > -mct > _________________________________________________________________________ > Philadelphia Linux Users Group -- http://www.phillylinux.org > Announcements - http://lists.netisland.net/mailman/listinfo/plug-announce > General Discussion -- http://lists.netisland.net/mailman/listinfo/plug > > _________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.netisland.net/mailman/listinfo/plug-announce General Discussion -- http://lists.netisland.net/mailman/listinfo/plug
|
|