AOH :: HP Unsorted M :: VA1492.HTM

Motorola Timbuktu's Internet Locator Service real-time data exposed to public.



Motorola Timbuktu's Internet Locator Service real-time data exposed to public.
Motorola Timbuktu's Internet Locator Service real-time data exposed to public.





We just want to make a public warning to those users of Motorola/Netopia
Timbuktu Remote Control Software who are using the Internet Locator
service. This service allows to locate any Timbuktu's user just by
knowing the email.

More than five months ago we notified Netopia's customer support
(http://blog.wintercore.com/?p=21), after discovering a hardcoded 
user/password pair within SALT.dll.

---------------
v 8.6.5.1373
Dll: SALT.dll
Address: 0x604b83D4
PE section: .rdata
user: xa7z8
pass: e74sa9
url: findme.netopia.com/_REMOVE_THIS_findme/
---------------

By using this information it was possible to access, in real-time, to
hundreds of users' records containing their IP, email, software version
and information related to the license.

We have received no reply since then. 5 months after, we have found out
what we would say an "obvious" patch:
"if the problem was the user/password, well, let's remove it!. Fixed.".
Really hilarious.

Now, *everyone* can access those records without having valid credentials.

Taking into account that there are remote exploits available for that
software, that everyone can grab your IP and software version, and that
there are emails from government, military and high-profile corporate
staff, better you disable that feature.


-- 

Wintercore
Agustin de Betancourt, 21. 8th Floor.
28003 Madrid. Spain.
Phone: +(34) 91 395 63 40
www.wintercore.com 

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.