发布时间 :1998-11-12 00:00:00
修订时间 :2016-10-17 22:02:52

[原文]The installation of 1ArcServe Backup and Inoculan AV client modules for Exchange create a log file, exchverify.log, which contains usernames and passwords in plaintext.

[CNNVD]Exchange 1ArcServe Backup及Inoculan AV客户端模块加密信息泄露漏洞(CNNVD-199811-011)

        Exchange下1ArcServe Backup及Inoculan AV客户端模块的安装程序创建的一个日志文件exchverify.log包含了用户名和明文密码。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:exchange_serverMicrosoft Exchange Server
cpe:/a:ca:inoculanComputer Associates Inoculan AV client
cpe:/a:ca:arcserve_backupComputer Associates 1ArcServe Backup

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  NTBUGTRAQ  19981112 exchverify.log
(UNKNOWN)  NTBUGTRAQ  19981117 Re: exchverify.log - update #1

- 漏洞信息

Exchange 1ArcServe Backup及Inoculan AV客户端模块加密信息泄露漏洞
中危 未知
1998-11-12 00:00:00 2006-09-01 00:00:00
        Exchange下1ArcServe Backup及Inoculan AV客户端模块的安装程序创建的一个日志文件exchverify.log包含了用户名和明文密码。

- 公告与补丁


- 漏洞信息

Multiple Exchange Modules exchverify.log Login Credential Disclosure
Local Access Required Authentication Management
Loss of Confidentiality
Exploit Public

- 漏洞描述

Innoculan AV for Exchange and ArcServe Backup for Exchange contain a flaw that may lead to an unauthorized password exposure. It is possible to gain access to plaintext passwords or the number of characters in the password by accessing the exchverify.log file which is created by the installation of these modules, which may lead to a loss of integrity.

- 时间线

1998-11-12 Unknow
1998-11-12 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): Delete the exchverify.log file.

- 相关参考

- 漏洞作者