[<prev] [next>] [day] [month] [year] [list]
Message-ID: <000601c4f99d$86ee91a0$0201a8c0@CIRT>
From: advisory at cirt.dk (CIRT Advisory)
Subject: Trend Micro Control Manager - Enterprise Edition
3.0 Web application Replay attack
The web application are vulnerable to a replay attack, meaning that the
username and password are encrypted but there are not used any form of
timestamp to make this mechanism more advanced and secure.
If it is possible to sniff the traffic when a user login to the
administrative interface, it is possible to replay this sequence and get a
valid login session, with the rights of the user.
Vendors response to this was, it is a feature not a vulnerability and all
the others also have this problem.
Read the full advisory at http://www.cirt.dk/advisories/cirt-28-advisory.pdf
----------------------------------------------------------------------
Danish Incident Response Team
http://www.cirt.dk
----------------------------------------------------------------------
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050113/bc35bb73/attachment.html
Powered by blists - more mailing lists