lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 20 Sep 2004 16:24:13 +0200 (CEST)
From: Jonas Olsson <jonas.olsson@...eit.se>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.netsys.com
Subject: Default username/password pairs in ON Command CCM 5.x database
 backend



Security advisory
=================
Advisory name: Default username/password pairs in ON Command CCM 5.x
	       database backend
Release date:  2004-09-20
Application:   ON Command CCM 5.x
Platform:      Linux, Solaris, Windows
Severity:      An intruder can gain access to all administrator
	       passwords and other sensitive data for managed systems
Author:        Jonas Olsson <jonas@...eit.se>


Summary
-------
Four default username/password pairs are present in the Sybase
database backend used by ON Command CCM 5.x servers. One of the
username/password pairs is publicly available in a knowledgebase
article at ON Technology's web site.

The database accounts can be used to read and modify all data in the
CCM database. The database contains among other things usernames and
passwords for administrative accounts for all managed workstations and
servers. In a default CCM installation the Sybase database server is
reachable from the network on the standard Sybase database port.

Two of the database account passwords are extremely easy to guess.


Vendor information
------------------
Symantec recently bought ON Technology which produces ON Command CCM.

Homepage:           http://www.symantec.com/
Vendor informed on: 2004-08-11
Vendor response:    Fix available in next release of CCM (version 6.0)
		    which will be available sometime in 2005.
Advisory mailed:    2004-09-20


Affected products
-----------------
* ON Command CCM version 5.x

We have not been able to verify the problem on earlier versions of ON
Command CCM since we have not had access to the software.


Background
----------
ON Command CCM is a solution for central management of Windows
workstations and servers. It handles unattended OS and software
installation on managed computers. All configuration information for
managed workstations, including passwords for local administrators,
domain administrator passwords if the workstation is joined to a
domain and license keys are stored in the CCM database.

The CCM server software is available for several OSes, including
Solaris, Linux and Windows.


Vulnerability impact
--------------------
Using any of the default database accounts an attacker can easily
retrieve all passwords in clear-text for all systems managed by
CCM. Since this includes the domain administrator password if CCM
handles joining managed systems to a domain (which is usually the
case) this can lead to compromise on both servers and workstations.

Any other sensitive data, such as license keys, is also available from
the CCM database.


Workarounds
-----------
* The passwords can be changed for three of the users. The fourth
  user's credentials are used by the CCM server daemons and are
  hard-coded in the binaries.

* The Sybase database port can be firewalled locally on the CCM
  server, denying access to network requests. Local requests can't be
  blocked however.


Contact
-------
AB TakeIT
http://www.takeit.se/
Jonas Olsson <jonas@...eit.se>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ