发布时间 :1999-05-27 00:00:00
修订时间 :2008-09-09 00:00:00

[原文]Windows NT RRAS and RAS clients cache a user's password even if the user has not selected the "Save password" option.

[CNNVD]Windows NT RRAS 和 RAS 客户端缓存一个用户的密码漏洞(CNNVD-199905-050)

        Windows NT RRAS和RAS客户端中存在漏洞。即使当用户没有选择“保存密码”选项,Windows NT RRAS和RAS客户端依然会缓存用户的密码。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-255 [凭证管理]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_nt:4.0:sp5Microsoft Windows 4.0 sp5
cpe:/o:microsoft:windows_2000Microsoft Windows 2000
cpe:/o:microsoft:windows_nt:4.0:sp3Microsoft Windows 4.0 sp3
cpe:/o:microsoft:windows_nt:4.0:sp1Microsoft Windows 4.0 sp1
cpe:/o:microsoft:windows_nt:4.0:sp4Microsoft Windows 4.0 sp4
cpe:/o:microsoft:windows_nt:4.0:sp2Microsoft Windows 4.0 sp2
cpe:/o:microsoft:windows_ntMicrosoft Windows NT

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  MS  MS99-017;%5BLN%5D;Q230681
(UNKNOWN)  MSKB  Q230681

- 漏洞信息

Windows NT RRAS 和 RAS 客户端缓存一个用户的密码漏洞
中危 未知
1999-05-27 00:00:00 2006-04-19 00:00:00
        Windows NT RRAS和RAS客户端中存在漏洞。即使当用户没有选择“保存密码”选项,Windows NT RRAS和RAS客户端依然会缓存用户的密码。

- 公告与补丁


- 漏洞信息 (19196)

Microsoft Windows NT 4.0/4.0 SP1/4.0 SP2/4.0 SP3/4.0 SP4/4.0 SP5 RAS Dial-up Networking "Save Password" Vulnerability (EDBID:19196)
windows local
1998-03-19 Verified
0 Martin Dolphin
N/A [点击下载]

Windows NT allows users to save their RAS (and/or RRAS) credentials by using the 'Save Password' checkbox when making a dial-up connection. Credentials saved in this manner are stored in the HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets\RasCredentials!SID#0 registry key.

These credentials can be enumerated using the LSA secrets code, as published by Paul Ashton.

If a user does not check the 'save password' checkbox to prevent the password from being stored, RAS will STILL save the successful connection information. This information includes the Dial-up username, phone number, and password, and is stored in the HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets\RasDialParams!SID#0 registry key.

This infromation can be enumerated using the LSA secrets code.

NOTE: Administrator privileges are needed to execute the LSA secrets code. 

Execute LSA Secrets (or similar) code against the HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets\RasDialParams!SID#0 registry key. Refer to NT LSA Secrets Vulnerability, July 16,1997 (		

- 漏洞信息

Windows NT RRAS/RAS Client Persistent Password Caching
Remote / Network Access Information Disclosure
Loss of Confidentiality Patch / RCS
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

1999-03-27 Unknow
Unknow 1999-05-27

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability. Check the Microsoft Security Bulletin in the references section.

- 相关参考

- 漏洞作者

Unknown or Incomplete