From owner-freebsd-security Thu Apr 8 18:35:44 1999 Delivered-To: freebsd-security@freebsd.org Received: from apollo.backplane.com (apollo.backplane.com [209.157.86.2]) by hub.freebsd.org (Postfix) with ESMTP id 3ADA214CD1 for ; Thu, 8 Apr 1999 18:35:43 -0700 (PDT) (envelope-from dillon@apollo.backplane.com) Received: (from dillon@localhost) by apollo.backplane.com (8.9.3/8.9.1) id SAA16835; Thu, 8 Apr 1999 18:33:06 -0700 (PDT) (envelope-from dillon) Date: Thu, 8 Apr 1999 18:33:06 -0700 (PDT) From: Matthew Dillon Message-Id: <199904090133.SAA16835@apollo.backplane.com> To: Foxfair Hu Cc: freebsd-security@FreeBSD.ORG Subject: Re: Fw: Netscape 4.5 vulnerability References: <370D516D2EE.C14EFOXFAIR@news.ks.edu.tw> Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org :Forwarded by Foxfair Hu :---------------- Original message follows ---------------- : From: Alexey Pavlov : To: BUGTRAQ@netspace.org : Date: Thu, 8 Apr 1999 21:12:27 +0400 : Subject: Netscape 4.5 vulnerability :-- : :I found method how to get users passwords from Netscape 4.5 for FreeBSD : ~user/.netscape/liprefs.js file. This file is used for storing user :last :session preferences .This file also contains encrypted password for :pop3. :Not like a DES , this encryption can be decrypted. As a result of many :experiments i wrote this program. It gives me almost all passwords in my : system, because all people use Netscape. :Here is src of this decryption programm: The 'security hole' is that netscape doesn't make the .netscape directory 700. I'd report it to netscape. I dunno whether they will do anything about it, though. -Matt To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message