The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] AS/400 Users Enumeration via POP3


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 17 Apr 2005 19:37:28 +0200
Subject: [UNIX] AS/400 Users Enumeration via POP3
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20050417171133.4A794574D@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  AS/400 Users Enumeration via POP3
------------------------------------------------------------------------


SUMMARY

The POP3 service installed on all modern AS/400 servers, which is turned 
on by default even in those cases where email serving was not setup, 
allows remote attackers to enumerate local users of the AS/400 machine.

DETAILS

Vulnerable Systems:
 * AS/400 version 4.5 and prior

Note: Previous versions display an uninteresting generic message "-ERR
Logon attempt invalid".

To access a POP3 server, you must authenticate and provide a user and a 
password. Unfortunately, the POP3 users represent real AS/400 user 
profiles, POP3 will authenticate any valid user profile, and the service 
provides too much information during  authentication.

Let's select a random list of names and passwords, connect to POP3 with a 
telnet client of your choice, and try to authenticate. Here is what a POP3 
session with an AS/400 server looks like:
+OK POP3 server ready
USER bogus
+OK POP3 server ready
PASS xyz
-ERR Logon attempt invalid CPF2204
USER qsysopr
+OK POP3 server ready
PASS xyz
-ERR Logon attempt invalid CPF22E2
USER jdavid
+OK POP3 server ready
PASS xyz
-ERR Logon attempt invalid CPF22E3
USER rbenny
+OK POP3 server ready
PASS xyz
-ERR Logon attempt invalid CPF22E4
USER qspl
+OK POP3 server ready
PASS xyz
-ERR Logon attempt invalid CPF22E5
USER SCARMEL
+OK POP3 server ready
PASS myrealpwd
+OK start sending message
quit

The error messages can interpreted as:
bogus Error CPF2204 User profile not found
qsysopr Error CPF22E2 Good user, password not correct for user profile
jdavid Error CPF22E3 Good user, bur user profile is disabled
rbenny Error CPF22E4 Good user, but password for user profile has expired
qspl Error CPF22E5 Good user, but no password associated with user profile 
scarmel OK Good password, good user

The POP3 gateway provides us with yet another way to verify the existence 
and validity of AS/400 user profiles and passwords. In contrast with 
Telnet, this method will not disable the terminal device because there is 
no device. This behavior is similar to that of FTP, which also does not 
disable the client after unsuccessful login attempts. However, the amount 
of information disclosed by the server is significantly higher than that 
of FTP. An automated tool can easily create a list of valid user profiles 
and of their current status on the server, providing a vector for a social 
engineering attack. Another factor that is relevant to the POP3 technique 
is the lack of exit programs associated with the service. Most other 
services that demand user authentication can be associated with a 
user-defined exit program that runs whenever the protocol is used. 
Unsuccessful log in attempts are logged only in the security audit 
journal, and only if it is turned on. This lack!  of control makes POP3 
the easier anonymous way to enumerate and list the user profiles.

Countermeasures:
The POP3 service is very rarely used on iSeries servers, and therefore 
should be stopped and disabled from starting. The unsuccessful attempts 
are logged only in the security audit log, if the audit log is turned on.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:shalom@venera.com. > Shalom 
Carmel.
The original article can be found at:  
<http://www.venera.com/downloads/Enumeration_of_AS400_users_via_pop3.pdf>; 
http://www.venera.com/downloads/Enumeration_of_AS400_users_via_pop3.pdf




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру