Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Software

Zimbra Desktop Vulnerable to Man-in-the-Middle Attack 49

tiffanydanica writes "For all the flack Mozilla gets about its new security warnings for https sites, at least it warns the user when a mismatch occurs. Sadly the new Yahoo! Zimbra Desktop (released in part to fix some security issues), doesn't bother validating the SSL certificate on the other side before sending along the username and password, making it vulnerable to a man-in-the-middle attack. This is certainly a step up from transmitting the information in the clear, since the attacker must switch from being passive to active, but with all of the DNS security problems, it would be fairly trivial for a malicious attacker to grab a large number of Yahoo! accounts (be it for phishing or spaming). Hopefully this issue will get fixed shortly, but for now Yahoo! Zimbra Desktop users may wish to use the webmail interface."
This discussion has been archived. No new comments can be posted.

Zimbra Desktop Vulnerable to Man-in-the-Middle Attack

Comments Filter:
  • by Sorthum ( 123064 ) on Sunday November 23, 2008 @03:02AM (#25862995) Homepage

    The first post is redundant? Odd.

    Anyhoo, no-- Phorm couldn't read it unless they're attempting to MITM SSL by default-- which would get the living crap sued out of them by just about everbody...

  • Re:man in the middle (Score:3, Informative)

    by aussie_a ( 778472 ) on Sunday November 23, 2008 @03:48AM (#25863093) Journal

    So a man in the middle would decompile the program, change the address it goes to, then recompile it, and that's going to be stopped if it used HTTPS?

    I do realise man-in-the-middle attacks are possible. But what you described certainly isn't one.

  • Re:man in the middle (Score:5, Informative)

    by x_MeRLiN_x ( 935994 ) on Sunday November 23, 2008 @04:24AM (#25863191)

    As aussie_a said, what you describe is in no way similar to a man-in-the-middle attack. 'MITM' refers to be the ability to eavesdrop on and forge network traffic. Fake login pages is part of 'phishing'.

    http://en.wikipedia.org/wiki/Man-in-the-middle_attack [wikipedia.org]
    http://en.wikipedia.org/wiki/Phishing [wikipedia.org]

  • Re:man in the middle (Score:5, Informative)

    by wirelessbuzzers ( 552513 ) on Sunday November 23, 2008 @04:39AM (#25863215)

    How do you just jump in the middle of someone's connection?

    There are a number of ways to do it. You can:

    • Be the victim's ISP.
    • Run an open wireless AP.
    • Break WEP or WPA (there's a known flaw in that too, now, at least if you use RC4).
    • Hack or spoof the victim's router.
    • Mess with the victim's DHCP.
    • Spoof mobile IPv6.
    • Several other attacks on a hub network.
    • ARP spoofing.
    • BGP spoofing.
    • Poison DNS caches.
    • Exploit the Kaminski flaw.

    There are probably a few other ways to do it, but that's all off the top of my head.

  • Re:man in the middle (Score:2, Informative)

    by Gnavpot ( 708731 ) on Sunday November 23, 2008 @04:44AM (#25863223)

    As aussie_a said, what you describe is in no way similar to a man-in-the-middle attack. 'MITM' refers to be the ability to eavesdrop on and forge network traffic. Fake login pages is part of 'phishing'.

    Phishing does not exclude MITM attacks.

    If the phishing site acts as a proxy to the real site - as described by the GP - it IS a MITM attack.

  • by iammani ( 1392285 ) on Sunday November 23, 2008 @06:30AM (#25863597)

    2. They look like errors. They're not errors, they're warnings.

    A bad SSL certificate is an error. These types of rationalization are simply born of outright laziness coupled with gross ineptitude.

    Especially since you can even get free ssl certificates from people like http://www.startssl.com/?app=1 [startssl.com]

  • by Cow Jones ( 615566 ) on Sunday November 23, 2008 @06:41AM (#25863625)

    You have to give the vendor at least a chance to get the bug fixed.

    No, you don't. For all we know, some black-hat hacker may have already found this vulnerability and be actively exploiting it.

    It's the same old discussion every time. There are arguments for and against releasing vulnerabilities without notifying the vendor in advance, I know, but from a developer's standpoint (and from a user's), it's preferrable to give at least a grace period before releasing the details.

    The advantages of releasing immediately are:

    • Users can be told about possible workarounds.
    • There's a better chance of the vendor releasing a patch/fix in a timely manner.
    • You can show off your l33t zero-day skillz.

    The disadvantages are:

    • Any black-hat who hadn't noticed the problem now knows about it and can write an exploit.
    • The entire user base is immediately at risk from script kiddies. If there was no exploit of the bug in the wild, there soon will be.
    • The vendor does not get time to send a security alert and workaround instructions to its registered users or to its security mailing list.
    • The vendor may have to rush the bugfix release before proper testing and QA is complete.

    In this specific case, the Zimbra users are definitely worse off, unless they happen to read Holden Karau's blog (or Slashdot).
    But maybe Holden will get his t-shirt now, so that's ok.

    CJ

  • Re:man in the middle (Score:0, Informative)

    by Anonymous Coward on Sunday November 23, 2008 @06:47AM (#25863639)
    SSL certs are fucking worthless. vericrap issue them and are a default CA in IE, yet it's been shown they make zero effort to authenticate who you are as long as you pay them the cash.
  • Re:Local http proxy? (Score:3, Informative)

    by gomoX ( 618462 ) on Sunday November 23, 2008 @01:51PM (#25865659) Homepage

    Most proxies just forward HTTPS traffic because they can't do anything else (they can't read the contents of the messages!).

    Technically you could verify the authenticity of the public key proposed by the host (or MitM) because IIRC at that point the communication isn't encrypted yet, but I don't know if there's personal proxying software that can do this.

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...