exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

VMWare Zimbra Mailer Release 8.6.0.GA Replay Attack

VMWare Zimbra Mailer Release 8.6.0.GA Replay Attack
Posted Feb 1, 2016
Authored by Tim Schughart

VMWare Zimbra Mailer Release 8.6.0.GA, latest patch and prior versions with DKIM implementation are vulnerable to longterm Mail Replay attacks. If the expiration header is not set, the signature never expires. This means, that the e-mail, perhaps caught while performing a man in the middle attack, can be replayed years after catching it.

tags | exploit
SHA-256 | 490724c2c6c71fba396ddb4a5b014b50c57e46f5a68bc5d679f1ecc3b14ba9ca

VMWare Zimbra Mailer Release 8.6.0.GA Replay Attack

Change Mirror Download
Hi@all,

VMWare Zimbra Mailer Release 8.6.0.GA, latest patch and prior versions
with DKIM implementation are vulnerable to longterm Mail Replay attacks.

If the expiration header is not set, the signature never expires. This
means, that the e-mail, perhaps catched while performing a man in the
middle attack, can be replayed years after catching it.

This can be combined with the spoofed reply-to header field, because the
header field is not hashed by Zimbras DKIM implementation.

Supporter of vulnerability analysis: Steffen Mauer @this point I want to
thank Steffen for his good work =)

Background:
To configure DKIM with VMware Zimbra the official documentation advises
the administrator to use the zimbra management tools. With the
management tools there is no possibility to add custom Header’s for
hashing it with DKIM or for setting the expiration DKIM Header.
(https://wiki.zimbra.com/wiki/Configuring_for_DKIM_Signing)

________________________________________
PoC Headerpart:
The DKIM Implementation implements the following DKIM Header:
Dkim-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=0mail.org;
s=76820800-C732-11E5-858E-A0DD11F66BE4; t=1454147943;
bh=c/tw0mGbL980zPjwnIKgPM7ubA7wLOVGbMr3y9WADOY=;
h=From:Content-Type:Content-Transfer-Encoding:Subject:Message-Id:
Date:To:Mime-Version;
b=c8dL4dRpnjMeV2OxFbz+1Z2n49PDlUx+XsiodKvmAOh1znOxRW3NDKYk7Bwmlw453
04uFAwLsBl7M1u7mxr/wdp4fZTEQtfJhhUonNJMKDBOxTdiQPOLhcVKC2tEaSLyKpq
Rvtp9ECFFqHstyRHk57UOzMi8PMRusl8lP5B43kY=
________________________________________
Report Timeline:

There has been no response from VMware for 14 Days.


Best regards / Mit freundlichen Grüßen

Tim Schughart
IT Security engineer

ProSec Networks
Website: https://www.prosec-networks.com
E-Mail: info@prosec.networks.com
Phone: +49(0) 2621 9469 252
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close