|
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
I once managed to convince an UW-IMAP server to dump the system password
file. I used no special tricks, just standard IMAP commands. While this
wasn't the shadow password file, it was still a complete list of users on
the box.
Admittedly, this can be easily corrected by hacking the source code to
force a user into their mailstore but to me, it's a problem at the
protocol level that even allows this. (Also, such a hack violates the IMAP
specification.)
--
GPG Fingerprint: C900 18EF 0C36 4EAF A93C F073 85D4 8B3C F3D8 077B
On the 30th day of April in the year 2003 you wrote:
> Date: Wed, 30 Apr 2003 23:04:34 -0400
> From: Michael C. Toren <mct@toren.net>
> To: plug@lists.phillylinux.org
> X-Spam-Status: No, hits=-0.7 required=5.0
> tests=IN_REP_TO,REFERENCES,SPAM_PHRASE_00_01,X_AUTH_WARNING
> version=2.44
> Subject: Re: [PLUG] pop3 server?
>
> > IMAP has some serious security problems at the protocol level that don't
> > look like they are going to get fixed anytime soon. (I'm not talking about
> > the fact that it's a clear text protocol.)
>
> Can you cite any specific examples?
>
> -mct
> _________________________________________________________________________
> Philadelphia Linux Users Group -- http://www.phillylinux.org
> Announcements - http://lists.netisland.net/mailman/listinfo/plug-announce
> General Discussion -- http://lists.netisland.net/mailman/listinfo/plug
>
>
_________________________________________________________________________
Philadelphia Linux Users Group -- http://www.phillylinux.org
Announcements - http://lists.netisland.net/mailman/listinfo/plug-announce
General Discussion -- http://lists.netisland.net/mailman/listinfo/plug
|
|