ConnecTalk Security Advisory: Qpopper leaks information during authentication

From: Marc Lafortune (mlafortuneat_private)
Date: Wed Jun 18 2003 - 11:43:44 PDT

  • Next message: Justin Wheeler: "Re: ConnecTalk Security Advisory: Qpopper leaks information during authentication"

    =============================================================================
    ConnecTalk Inc.               Security Advisory
    
    Topic:          Qpopper leaks information during authentication
    
    Vendor: Eudora
    Product: qpopper 4.0.4 and qpopper 4.0.5
    Note: other versions have not been tested.
    Problem found: May 14, 2003
    Vendor notification: May 14, 2003
    Second vendor notification: May 21, 2003
    Public notification: June 18, 2003
    
    I.   Background
    
    Qpopper is the most widely-used server for the POP3 protocol (this
    allows users to access their mail using any POP3 client).  Qpopper
    supports the latest standards, and includes a large number of optional
    features.  Qpopper is normally used with standard UNIX mail transfer and
    delivery agents such as sendmail or smail.
    
    II.  Problem Description
    
    When Qpopper is in the authentication phase, using plain text passwords,
    the response to the PASS command differs depending on the existance of
    the USER.  If a valid username and a wrong password are given, Qpopper
    returns a negative reponse and waits for one more command before closing
    the connection.  If an invalid username and password are given, Qpopper
    returns a negative response and disconnects right away.
    
    III. Impact
    
    A remote attacker can use this information leak to validate the
    existance of a user account.
    
    
    -- 
    Marc Lafortune
    mlafortuneat_private
    Intégrateur / Integrator
    ConnecTalk Inc.
    http://www.connectalk.com
    



    This archive was generated by hypermail 2b30 : Wed Jun 18 2003 - 14:31:33 PDT