CVE-1999-0755
CVSS5.0
发布时间 :1999-05-27 00:00:00
修订时间 :2008-09-09 00:00:00
NMCOE    

[原文]Windows NT RRAS and RAS clients cache a user's password even if the user has not selected the "Save password" option.


[CNNVD]Windows NT RRAS 和 RAS 客户端缓存一个用户的密码漏洞(CNNVD-199905-050)

        Windows NT RRAS和RAS客户端中存在漏洞。即使当用户没有选择“保存密码”选项,Windows NT RRAS和RAS客户端依然会缓存用户的密码。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-255 [凭证管理]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_nt:4.0:sp5Microsoft Windows 4.0 sp5
cpe:/o:microsoft:windows_2000Microsoft Windows 2000
cpe:/o:microsoft:windows_nt:4.0:sp3Microsoft Windows 4.0 sp3
cpe:/o:microsoft:windows_nt:4.0:sp1Microsoft Windows 4.0 sp1
cpe:/o:microsoft:windows_nt:4.0:sp4Microsoft Windows 4.0 sp4
cpe:/o:microsoft:windows_nt:4.0:sp2Microsoft Windows 4.0 sp2
cpe:/o:microsoft:windows_ntMicrosoft Windows NT

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0755
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0755
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199905-050
(官方数据源) CNNVD

- 其它链接及资源

http://www.microsoft.com/technet/security/bulletin/ms99-017.mspx
(UNKNOWN)  MS  MS99-017
http://support.microsoft.com/default.aspx?scid=kb;%5BLN%5D;Q230681
(UNKNOWN)  MSKB  Q230681

- 漏洞信息

Windows NT RRAS 和 RAS 客户端缓存一个用户的密码漏洞
中危 未知
1999-05-27 00:00:00 2006-04-19 00:00:00
远程  
        Windows NT RRAS和RAS客户端中存在漏洞。即使当用户没有选择“保存密码”选项,Windows NT RRAS和RAS客户端依然会缓存用户的密码。

- 公告与补丁

        

- 漏洞信息 (19196)

Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3/4.0 SP4/4.0 SP5 RAS Dial-up Networking "Save Password" Vulnerability (EDBID:19196)
windows local
1998-03-19 Verified
0 Martin Dolphin
N/A [点击下载]
source: http://www.securityfocus.com/bid/232/info

Windows NT allows users to save their RAS (and/or RRAS) credentials by using the 'Save Password' checkbox when making a dial-up connection. Credentials saved in this manner are stored in the HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets\RasCredentials!SID#0 registry key.

These credentials can be enumerated using the LSA secrets code, as published by Paul Ashton.

If a user does not check the 'save password' checkbox to prevent the password from being stored, RAS will STILL save the successful connection information. This information includes the Dial-up username, phone number, and password, and is stored in the HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets\RasDialParams!SID#0 registry key.

This infromation can be enumerated using the LSA secrets code.

NOTE: Administrator privileges are needed to execute the LSA secrets code. 

Execute LSA Secrets (or similar) code against the HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets\RasDialParams!SID#0 registry key. Refer to NT LSA Secrets Vulnerability, July 16,1997 (http://www.exploit-db.com/exploits/19195/)		

- 漏洞信息

11409
Windows NT RRAS/RAS Client Persistent Password Caching
Remote / Network Access Information Disclosure
Loss of Confidentiality Patch / RCS
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

1999-03-27 Unknow
Unknow 1999-05-27

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability. Check the Microsoft Security Bulletin in the references section.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站