Out of the box, the e/pop application has no security settings enabled.  Any
peer can take control of your desktop without warning.

The initial configuration not withstanding, I sent an email to
[EMAIL PROTECTED] about a vulnerability in the way the software exchanges
security codes over the network:

Software Affected
-----------------
WiredRed e/pop 2.0.3.125

Description
-----------
Security Codes configured in the e/pop Control Panel are sent in the
clear. Several security codes can be configured from the e/pop control
panel:

  Global: must be installed on each e/pop peer in order to
          communicate and is also used to restrict access to the
          control panel.

  Features: Send and Receive codes can be configured for each of the
          following features: Message, Chat, Admin, Remote, and
          AppShare.


Impact
------
Security codes can be easily snooped and used to communicate with and/or
take control of e/pop peers that have security codes configured.


Suggestion
----------
Send a message digest (e.g. MD5) of the security code instead of sending it
in the clear.


The following was the response I received:

>
>Thank you for your suggestion, but physical security is not the
>responsibility of e/pop, but the responsibility of your company.  If
>someone
>has the ability to snoop your network with a packet sniffer, then they have
>the ability to install password grabbing trojans on your PCs and various
>other things.
>
>That is why security classifications such as C2 does not extend to physical
>premises security and control for software, and companies like Novell and
>Microsoft who meet these requirements are still vunerable in physical
>security attacks, such as console access.
>
>We appreciate your suggestions though and will take them into consideration
>as MD5 and RC6 security is used internally within e/pop to encode codes.

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com

Reply via email to