![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.61537 |
Category: | Mandrake Local Security Checks |
Title: | Mandrake Security Advisory MDVSA-2008:193 (kolab-server) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to kolab-server announced via advisory MDVSA-2008:193. Gavin McCullagh of Griffith College Dublin reported an issue in Kolab v1 where user passwords were being recorded in the Apache log files due to Kolab using HTTP GET requests rather than HTTP POST requests. This would allow any users with access to the Apache log files to harvest user passwords and possibly other sensitive data. The patch to fix this problem also corrects and issue where non-alphanumeric characters in passwords, set via the Kolab web interface, did not work. The updated packages have been patched to prevent these issues. Many thanks to Gavin McCullagh for his help in writing the patch and testing the fix. As well, to scrub existing log files to remove existing stored passwords, the following sed command can be used: sed -i 's/\(&password_0=\).*\(&password_1=\).*\(&mail_0\)/\1xxxxxxxx\2xxxxxxxx\3/' /var/log/httpd/ssl_access_log* Affected: Corporate 3.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2008:193 Risk factor : High |
Copyright | Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |