what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

r9-aolserver.txt

r9-aolserver.txt
Posted Aug 17, 1999
Authored by rhino9

Vulnerability in AOL Server 2.2 - modu1e, chame|eon, vacuum

SHA-256 | 147892c0184fcc5a6fe7c9b18666b7919a03a77380364805bc6988b6211e598d

r9-aolserver.txt

Change Mirror Download

Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9

##### #####
## ## ## ##
## ## ## ##
##### #####
## ## ##
## ## ##

Rhino9, The security research team.

[http://www.rhino9.org]

Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9


Rhino9 security advisory #1
---------------------------

Title : Vulnerability in AOL Server 2.2 (Unix)
Date : 22nd January 1998
Authors : modu1e, chame|eon, vacuum

Problem :
---------

Any local user is able to retrieve the encrypted password of the AOLserver's
nsdadmin account, the password system uses DES, so the attacker can crack the
password using the appropriate software. This is because the nsd.ini file,
which AOLserver uses to set up it's port settings and other characteristics,
is world-readable.


Impact :
---------

The nsadmin account can be compromised and then used to modify the
AOLserver configuration, change passwords or shutdown the server.
Once a local user has cracked the password, he is then able to use a web
browser to reconfigure the server by visiting the following URL..

http://host.to.attack.com:9876/NS/Setup

We use port 9876 because it was defined in the nsd.ini file as :

[ns/setup] Port=9876.

Once at the password prompt, the attacker simply enters the nsadmin username
and the password that he cracked. The attacker now has complete control over
the AOLserver.


Exploit :
---------

Locally, locate the AOLserver directory (find / -name nsd.ini), and follow
these simple steps..

% cd <AOLserver directory>
% grep Password nsd.ini
Password=t2GU5GN5XJWvk
%

..Next crack the DES encrypted string using your favorite cracker program.


Fix :
---------

Make the nsd.ini file readable only by it's owner.


Additional information :
------------------------

This problem was originally found by modu1e, vacuum and chameleon of the
Rhino9 security research team [www.rhino9.org]


Copyright information :
------------------------

The contents of this advisory are Copyright (c) 1998 the Rhino9 security
research team, this document may be distributed freely, as long as proper
credit is given.


Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9

##### #####
## ## ## ##
## ## ## ##
##### #####
## ## ##
## ## ##

Rhino9, The security research team.

[http://www.rhino9.org]

Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9 Rhino9
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close