A vulnerability exists in the remote administration client for RhinoSoft Serv-U. During the authentication process, the client ignores the S/KEY one-time password (OTP) challenge sent by the server and sends the password entered by the user in plaintext.
RhinoSoft Serv-U is a shareware Windows FTP server that supports S/KEY one-time password (OTP) authentication using MD4 or MD5 hash algorithms. Cat Soft LLC is also involved in the development of Serv-U and is an affiliate of RhinoSoft. The Serv-U distribution includes an administration client that can be used to manage Serv-U servers remotely. Serv-U user accounts can be configured to use plaintext or S/KEY OTP authentication, and accounts can be granted several levels of administrative privilege on the server. When a user with administrative privileges attempts to log on to a Serv-U server using the remote administration client, and that user's account is configured on the server to use S/KEY OTP authentication, the server correctly sends an S/KEY OTP challenge, but the administration client ignores the challenge and sends the password entered by the user in plaintext. The server refuses the plaintext password and authentication fails, and the plaintext password is exposed on the network.
A properly located intruder using a sniffer can obtain administrative users' passwords. In addition, an administrative user account configured to use S/KEY OTP cannot log into a Serv-U server using a vulnerable remote administration client.
The CERT/CC is currently unaware of a practical solution to this problem.
The CERT Coordination Center thanks Fred Maxwell for reporting this vulnerability.
This document was written by Art Manion.
|Date First Published:||2001-11-19|
|Date Last Updated:||2002-11-15 22:16 UTC|