To whom it concerns, Regarding the vulnerability in the advisory for IRCXpro 1.0 They are of minuscule threat and not worth the attention. Vulnerability(s): 1. Local clear passwords Our Reply: It is common place for all IRC Server applications to store clear passwords in the IRCD.config files. The nature of the program is for it to be used by Remote Users, NOT local ones. 2. Remote default admin enabled Our Reply: The user is prompted before the server starts for the first time to set their own Operator Name and Password during the Initial Wizard for their administrator account. (See initial.gif file attachment) The fragment >> Serv.LogonSettings "LocalHost", 7100, "admin", "password" << is from a sample .ASP page found in the IRCXpro SDK (Software Development Kit). In order for this sample to work, the real operator name and password needs to be inserted before being placed on IIS (Internet Information Services). Regards, IRCXpro Support Quality On Line Ltd ----- Original Message ----- From: "morning_wood" <se_cur_ityat_private> To: <bugtraqat_private>; <full-disclosureat_private>; <supportat_private>; <salesat_private> Sent: Tuesday, June 03, 2003 8:57 AM Subject: IRCXpro 1.0 - Clear local and default remote admin passwords > ------------------------------------------------------------------ > - EXPL-A-2003-002 exploitlabs.com Advisory 002 > ------------------------------------------------------------------ > -=- IRCXpro 1.0 -=- > > > Vunerability(s): > ---------------- > 1.local clear passwords > 2.remote default admin enabled > > > Product: > -------- > IRCXpro Server 1.0 > http://www.ircxpro.com > > > Reviews: > -------- > http://www.serverwatch.com/sreviews/article.php/1501261 > http://reviews.zdnet.co.uk/review/41/2/3418.html > > > Description of product: > ----------------------- > "IRCXpro is a feature rich Internet Relay-Chat (IRC/IRCX) Server > that can provide the basis for an interactive online community. > Guests will be able to take part in conversation using either > an Internet Browser chat client or 3rd party chat software." > > > VUNERABILITY / EXPLOIT > ====================== > > > Local: > ------ > All passwords and user names are inside settings.ini ... in the clear > > > Remote: > ------- > Default Settings... Remote admin. > > > Serv.LogonSettings "LocalHost", 7100, "admin", "password" > > > Vendor Fix: > ----------- > No fix on 0day > > Vendor Contact: > --------------- > salesat_private > supportat_private > > Concurrent with this advisory > > Credits: > -------- > > Donnie Werner > http://exploitlabs.com "where finding your holes is job one, and plugging > them twice the phun" > morning_woodat_private > Corporate Security Needs at http://fram4.com Security Systems > >
This archive was generated by hypermail 2b30 : Tue Jun 03 2003 - 07:15:14 PDT