发布时间 :2005-05-02 00:00:00
修订时间 :2017-07-10 21:32:26

[原文]Nortel VPN client 5.01 stores the cleartext password in the memory of the Extranet.exe process, which could allow local users to obtain sensitive information.

[CNNVD]Nortel VPN Client口令泄露漏洞(CNNVD-200505-742)

        Nortel VPN Client 5.01版本在Extranet.exe进程内存中存储明文密码。本地用户可使用Nortel VPN路由器和VPN服务器安全远程访问IP网络,获取敏感信息。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-310 [密码学安全问题]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20050322 Nortel VPN Client Issue: Clear-text password stored in memory
(UNKNOWN)  XF  nortel-contivity-information-disclosure(19791)

- 漏洞信息

Nortel VPN Client口令泄露漏洞
中危 设计错误
2005-05-02 00:00:00 2006-08-30 00:00:00
        Nortel VPN Client 5.01版本在Extranet.exe进程内存中存储明文密码。本地用户可使用Nortel VPN路由器和VPN服务器安全远程访问IP网络,获取敏感信息。

- 公告与补丁


- 漏洞信息

Nortel Contivity VPN Client Local Password Disclosure

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-03-22 Unknow
2005-03-22 Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Nortel Contivity VPN Client Local Password Disclosure Weakness
Design Error 12871
No Yes
2005-03-22 12:00:00 2009-07-12 10:56:00
Discovery of this issue is credited to Roy Hills <>.

- 受影响的程序版本

Nortel Networks Contivity VPN Client 5.0 1_030

- 漏洞讨论

Nortel Contivity VPN Client for Microsoft Windows platforms is reported prone to a local pre-shared key (password) disclosure weakness. It is reported that the VPN user and group password is stored in the memory image of the process in plain-text format.

Credentials that are harvested through the exploitation of this weakness may then be used to aid in further attacks.

This weakness is reported to affect Nortel Contivity VPN Client version 5.01 for Microsoft Windows, versions for the Linux platform are not reported to be vulnerable. Other versions might also be affected.

- 漏洞利用

No exploit is required.

- 解决方案

Nortel Networks has released security advisory 2005005619 acknowledging this issue. Please the referenced advisory for further information.

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考