![]() #Zimbra desktop exploit softwareKarau admits that the Hack Day wasn't the best place to bring the issue up, but claims that – despite not placing in the competition, unsurprisingly – he has no regrets: “ In retrospect it probably wasn't the best forum to bring up the security defects, but it was the most convenient.”Ī spokesperson for Yahoo claims that “ problem has already been addressed in code, and fix is in the next release,” although offers no explanation for how e-mail software in this day and age could be set to plain-text authentication.Īny Zimbra users out there panicking about who's reading their e-mails, or don't you care who has access to your spam? Share your thoughts over in the forums. And, for those that dont want to use a separate e-mail server (Zimbra is a mail server with a web GUI), there is a Zimbra Desktop product that gives you a. Zimbra sanitizes HTML content in incoming emails on the server side, using OWASP Java-HTML-Sanitizer approach, which allows for first vulnerability to occur. For users on a wireless network, it's even more of an issue: wireless systems work by broadcasting all data to all clients, making it trivial to eavesdrop a conversation and pick up the password. JavaScript payload is triggered and interact with the Zimbra web interface in order to exploit the second flaw automatically in the background, without any further user interaction. ![]() While the flaw requires a fairly unlikely attack – at some point between you and the server, an attacker would have to 'sniff' the traffic to capture the passwords – it is by no means impossible to exploit. #Zimbra desktop exploit passwordIn a post on his blog, Holden explains that the IMAP e-mail servers that Yahoo uses for its Yahoo Zimbra Desktop client don't support the Secure Sockets Layer encryption protocol, which means “ the password was being transmitted in plain text.” Since learning of the reported vulnerability, Zimbra Engineering has verified the issue and produced a hotfix (for 8.8.15 p30). ![]() Unfortunately, Yahoo got rather more than it bargained for from Karau. A new Zero-day exploit has been identified that affects Zimbra 8.8.15. If you use Yahoo's Zimbra client to check your e-mails, you might want to think about changing your passwords – a flaw in the program reveals your private information in plain text.Īccording to an article over on CNet, Canadian hacker Holden Karau discovered the flaw in Zimbra whilst participating in the Yahoo University Hack Day, a programme aimed at encouraging developers and hackers to play with Yahoo APIs and invent new applications. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |