5668739 2000-11-02 04:55 /52 rader/ Brevbäraren (som är implementerad i) Python Mottagare: Bugtraq (import) <13544> Kommentar till text 5659539 av Brevbäraren (som är implementerad i) Python Ärende: Re: Samba 2.0.7 SWAT vulnerabilities ------------------------------------------------------------ From: Richard Trott <trott@SLOWPOISONERS.COM> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <Pine.BSO.4.21.0010311450350.14568-100000@www> On Mon, 30 Oct 2000, Optyx - Uberhax0r Communications wrote: > The program swat included in the samba distribution allows username and > password bruteforcing. An attacker can easily generate userlists and then > bruteforce their passwords. Comments in the source code show that somebody > tried to prevent this from happening[1]. > > The problem occurs when a user types in the wrong password. If swat gets a > valid username, but incorrect password it errors with: > > 2second pause > > 401 Authorization Required > > You must be authenticated to use this service. > > If swat gets a invalid username / password: > > NO PAUSE > > 401 Bad Authorization > > username/password must be supplied This kind of error is extraordinarily common. I just noticed that CS&T's CorporateTime for the Web does this. If you type in the wrong password, you get "The password you entered is incorrect." If you type in the wrong username, you get "The system found no matches for the given search string." In addition to the latter message being cryptic to the average user, the different messages make it easy to determine valid usernames. Nothing like making it easy for a cracker to come up with a list of valid usernames to brute-force... I'm sure if everyone reported these problems to BugTraq, we could generate a very, very long list of products that have this same problem. I'd actually like to generate just such a list of products. Feel free to send example products (free, commercial, whatever) to me (and/or to Bugtraq; hey, it's moderated) and if I get enough, maybe I'll post a Web page. [CorporateTime for the Web also appears to do other not-so-security-conscious things like create a world writeable log directory (lexacal-private/log--and that private directory is created with world read and execute permissions, so it is not private at all).] Rich (5668739) ------------------------------------------(Ombruten) Kommentar i text 5671827 av Brevbäraren (som är implementerad i) Python Kommentar i text 5672235 av Brevbäraren (som är implementerad i) Python 5671827 2000-11-02 18:25 /39 rader/ Brevbäraren (som är implementerad i) Python Mottagare: Bugtraq (import) <13549> Kommentar till text 5668739 av Brevbäraren (som är implementerad i) Python Ärende: Re: Samba 2.0.7 SWAT vulnerabilities ------------------------------------------------------------ From: Gerald Carter <gcarter@VALINUX.COM> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <3A0165C1.CFB2A02D@valinux.com> > On Mon, 30 Oct 2000, Optyx - Uberhax0r Communications wrote: > > > The program swat included in the samba > > distribution allows username and password bruteforcing. > > An attacker can easily generate userlists and then > > bruteforce their passwords. Comments in the source > > code show that somebody tried to prevent this > > from happening[1]. Just an FYI.... These reported problems have been corrected in the latest version of our HEAD branch code and will be in the next release of Samba (2.2.0 - currently in alpha release stages). Many thanks to Samba developer, Jeremy Allison, for addressing this. Cheers, jerry ---------------------------------------------------------------------- /\ Gerald (Jerry) Carter Professional Services \/ http://www.valinux.com/ VA Linux Systems gcarter@valinux.com http://www.samba.org/ SAMBA Team jerry@samba.org http://www.plainjoe.org/ jerry@plainjoe.org "...a hundred billion castaways looking for a home." - Sting "Message in a Bottle" ( 1979 ) (5671827) ------------------------------------------ 5672235 2000-11-02 20:36 /51 rader/ Brevbäraren (som är implementerad i) Python Mottagare: Bugtraq (import) <13563> Kommentar till text 5668739 av Brevbäraren (som är implementerad i) Python Ärende: Re: Samba 2.0.7 SWAT vulnerabilities ------------------------------------------------------------ From: Ryan Gray <ryan@SNIPER.ORG> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <Pine.LNX.4.30.0011011939120.13140-100000@catalyst.catalystsol.com> CheckPoint Firewall-1 (at least up to version 4.0) has similar behavior. Firewall-1 uses port 259 for client authentication. If a valid username and invalid password is used: User: validuser FireWall-1 password: ****** Access denied by FireWall-1 authentication User: ################################### And if an invalid username is used: User: invaliduser User someuser not found User: ################################### I'm not sure about 4.1, but from the work that I've done with it, I'd imagine that it behaves the same. Regards, Ryan Gray Catalyst Solutions, Inc. On Tue, 31 Oct 2000, Richard Trott wrote: > I'm sure if everyone reported these problems to BugTraq, we could generate > a very, very long list of products that have this same problem. I'd > actually like to generate just such a list of products. Feel free to send > example products (free, commercial, whatever) to me (and/or to Bugtraq; > hey, it's moderated) and if I get enough, maybe I'll post a Web page. > > [CorporateTime for the Web also appears to do other > not-so-security-conscious things like create a world writeable log > directory (lexacal-private/log--and that private directory is created with > world read and execute permissions, so it is not private at all).] > > Rich > (5672235) ------------------------------------------(Ombruten)