lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAK2yVmEoV=4HU3=juRbcx-HJZsZT2Zq3rNFAuQQxvFnjWbF4Tw@mail.gmail.com>
Date: Thu, 28 Feb 2013 12:53:11 +0100
From: Raffaele Addesso <r.addesso@...ersistemi.it>
Cc: "Di Ruzza, Oscar" <o.diruzza@...ersistemi.it>,
	Giuseppe Di Palma <g.dipalma@...ersistemi.it>,
	Shared Security Service Center <security@...ersistemi.it>
Subject: Advisory Notification

Advisory ID: EWS00001
Product: SecureCRT
Vendor: www.vandyke.com
Vulnerable Version(s): 7.0.3 and probably prior
Tested Version: 7.0.3
Vendor Notification: February 23, 2013
Vendor Patch: No patch
Public Disclosure: February 28, 2013
Vulnerability Type: Insecure password stored
Risk Level: Medium
Solution Status: Workaround by Vendor
Discovered and Provided: Intersistemi Spa EWS Early Warning Services (
http://www.intersistemi.it/ )

-----------------------------------------------------------------------------------------------
Successful exploitation allows to malicious people show encrypted password
stored in config file
session .ini .

Advisory Details

To exploit the vulnerability:

1) Edit the .ini file for example change the username and put in a bad
username

For example

S:"Server To Client MACs"=MD5,SHA1,SHA1-96,MD5-96
S:"Username"=root  (change to roots)
D:"Disable Resize"=00000002
D:"Audio Bell"=00000001

2) Save and try to connect the server. At this time the client try to
establish a ssh connection, when the
authentication fail the client show us a popup precompiled form whit
username (false) and password obscured by asterisk


3) Now we use a simple software such as Asterisk Key for reveals Hidden
Passwords



-----------------------------------------------------------------------------------------------

Solution:

In the interim, there are ways to work around the problem
and mitigate the issue:

   1) Do not save passwords. The ability to save passwords is
      a feature that many of our customers find convenient,
      even though it is not a best practice.

   2) Disable saving passwords within SecureCRT.  For
      administrators who want to ensure a high level of
      security, we strongly recommend disabling the save
      password functionality entirely.  SecureCRT provides a
      GPO Administrative template to enable administrators to
      control whether saving passwords is allowed. Information
      about this administrative template can be found in the
      SecureCRT help under the "Administrative Template"
      topic. Individuals who desire more information regarding
      this administrative restriction should contact our
      technical support team: support@...dyke.com.

-----------------------------------------------------------------------------------------------

-- 
Raffaele Addesso
______________________
Intersistemi EWS (Early Warning Service)
Intersistemi Italia S.p.A.
Via dei Galla e dei Sidama, 23
00199 - Rome (Italy)

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ