Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.61537 |
Categoría: | Mandrake Local Security Checks |
Título: | Mandrake Security Advisory MDVSA-2008:193 (kolab-server) |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing an update to kolab-server announced via advisory MDVSA-2008:193. Gavin McCullagh of Griffith College Dublin reported an issue in Kolab v1 where user passwords were being recorded in the Apache log files due to Kolab using HTTP GET requests rather than HTTP POST requests. This would allow any users with access to the Apache log files to harvest user passwords and possibly other sensitive data. The patch to fix this problem also corrects and issue where non-alphanumeric characters in passwords, set via the Kolab web interface, did not work. The updated packages have been patched to prevent these issues. Many thanks to Gavin McCullagh for his help in writing the patch and testing the fix. As well, to scrub existing log files to remove existing stored passwords, the following sed command can be used: sed -i 's/\(&password_0=\).*\(&password_1=\).*\(&mail_0\)/\1xxxxxxxx\2xxxxxxxx\3/' /var/log/httpd/ssl_access_log* Affected: Corporate 3.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2008:193 Risk factor : High |
Copyright | Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |