4.9 • 696 Ratings
🗓️ 16 June 2022
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, June 16th, 2020 edition of the Sandsenet Storms' |
0:06.3 | Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:13.4 | Quick post today on the Storm Center website by Dustin Lee, one of our sands.edu undergraduate interns, and it's actually just a quick |
0:23.4 | video presentation about how to set up a honeypot for the shield using various cloud |
0:30.6 | providers. |
0:31.1 | So if you thought about doing that, well, take a look at Dustin's presentation. |
0:36.6 | Thanks to Jason for pointing me to a vulnerability that Sonor source discovered in |
0:43.4 | Cimbra email. |
0:45.1 | Now, this is a little competitor to hoard email, which we, I think, covered a vulnerability |
0:50.6 | in last week. |
0:51.9 | It's one of those webmail sort of exchange like systems, |
0:56.2 | but open source. The problem here is that Cimbra uses a proxy engine X in order to direct |
1:05.1 | users to different bag ends and then to consistently forward particular users to particular bag ends, it maintains a Memcash |
1:15.1 | database that links user accounts to particular endpoints. Now, this is all good so far, but the |
1:23.0 | problem is that it's possible to inject records into the MAM cache database because they're not |
1:30.1 | correctly filtering carriage return line feeds. And with that, NetHacker can essentially inject |
1:36.4 | a particular record that would direct a specific user to a back end. That's actually not |
1:42.0 | a backend, but instead the attacker's server, |
1:45.2 | which will then receive all requests from the user, including username and password. |
1:52.3 | Pretty neat, a little vulnerability, certainly something that you need to address, |
1:56.7 | but also something that you, if you're not running SIMPRA, should just read the report to see what can go wrong with MemcashD here in particular. |
2:07.4 | And with thought, I owe the cloud security company that found a number of interesting vulnerabilities, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.