lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: se_cur_ity at hotmail.com (Hotmail)
Subject: Prrivacy Vunerability Ifriends IFCAM96D

For the past year Ifriends.com ( WP Associates ) has known about a security compromise in its chathost software ifcam96d. The program is coded in such a way, and the structure of Ifriends.com Java/Browser based traction scheme that makes it possible to bypass all security measures and payment, alowing compromised viewing of private chathost sessions. I will briefly detail the problem, the compromize, and the resolve taken as of this posting. Ifcam96d is a software platform for dellivering private, live, pay per view adult content. Examining the ifcam.exe binary in Bintext or similar, reveals that the program is comprised of a combination of VB, Java and HTML code. Simply by examnining this, making a text copy of the binary and subsituting a file name present in a java class for a parameter in the applet tags, presents you with a crude but effictive viewer for these "private shows". With only the information for ip address and port of any operating ifcam setup, this allows you total view of the chathosts webcam video. This is a serious Privacy Violation in direct contrast to WP/Ifriends own statements at http://www.ifriends.net/experts/toursexcursions.htm and I quote ". It's called a "one-to-one" connection. And it guarantees privacy for both you and the customer. Nobody can snoop and watch for free." . Indeed it is a "one-to-one" connection and viewing is possible without the parent company aware that this is taking place. In Jan 2002 I personally retained a lawyer to contact WP accociates regarding a chathost(me), that had noticed prople were viewing thier cam although I was not logged into thier service, meerly having the software running. Thier reply at that date was "we are aware of the problem and there really nothing we can do for you, sorry" Further examination reveals embedded ip addresses that informs ifriends that the software is running even if not logged in, full unrestricted access to you video at any time, and the ability to send a "please return to your cam" announce ability. Finaly there is an undocumented access port 7903. Webpower Inc has been informed of a development of a proof of concept program, CamScam screenshot to fully exploit these flaws and to show the lack of privacy commitment of a very large internet company. They were offered the oportunity to have us develop this into an integrated part of their operation as it can be modified very easily to thier specifications and completly would remove the vunerability that exists. As of March 14 4:25 pm Ifriends has released a new version of thier chathost software, addressing some of these issues while not completly curing the problem. As well.. Upon review of thier public and chathost forums, I see they have not taken the steps to inform thier members/hosts of the privacy issues discussed here. Full exploit info and discussion available, contact: morningwood@...pub.co.za Pro Active Security http://take.candyfrom.us http://mywood.kicks-ass.org/thcore/ 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030323/21513c03/attachment.html

Powered by blists - more mailing lists