Praetorian503 Posted February 21, 2013 Report Posted February 21, 2013 The Alt-N MDaemon version 13.0.3 WorldClient application suffers from a username enumeration vulnerability based on responses provided.==================================================================== Alt-N MDaemon's WorldClient Username Enumeration Vulnerability====================================================================Software: Alt-N MDaemon v13.0.3 and prior versionsVendor: http://www.altn.com/Vuln Type: Username EnumerationRemote: YesLocal: NoDiscovered by: QSecure and Demetris PapapetrouReferences: http://www.qsecure.com.cy/advisories/Alt-N_MDaemon_WorldClient_Username_Enumeration.htmlDiscovered: 14/09/2012Reported: 19/12/2012Fixed: 15/01/2013 (http://files.altn.com/MDaemon/Release/RelNotes_en.html)Disclosed: 18/02/2013VULNERABILITY DESCRIPTION:==========================Alt-N WorldClient is prone to a username-enumeration weakness byquerying the user's Free-Busy schedule. The DTSTART and DTENDparameters in the returned FBData.vfb file, may indicate whether anemail address/username is valid or not.Attackers may exploit this weakness to discern valid usernames. Thismay aid them in brute-force password cracking or other attacks.Alt-N MDaemon v13.0.3 & v12.5.6 were tested and found vulnerable;other versions may also be affected.PoC Exploit:============http://www.example.com:3000/WorldClient.dll?View=fbinfo&User=mickey.mouse@qsecure.com.cyFor valid email accounts the DTSTART and DTEND values in the .vfb filestart with a recent date backwards (e.g. 20120505) whereas for invalidones the date is 19801231.Source: PacketStorm Quote