|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Windows >> DameWare NT Utilities Authentication Credentials Persistence Weakness Vulnerability Assessment Details
|
DameWare NT Utilities Authentication Credentials Persistence Weakness |
||
Checks for authentication credentials persistence weakness in DameWare NT Utilities Detailed Explanation for this Vulnerability Assessment Summary : The remote Windows host contains an application that is prone to a privilege escalation issue. Description : According to its version number, the copy of DameWare NT Utilities installed on the remote host permits a local user to recover authentication credentials because the application stores sensitive information in memory as plain text: username, password, remote user, and remote hostname. See also : http://www.shellsec.net/leer_advisory.php?id=7 http://archives.neohapsis.com/archives/bugtraq/2005-04/0225.html http://www.dameware.com/support/security/bulletin.asp?ID=SB5 Solution : Upgrade to DameWare NT Utilities 3.80 / 4.9 or later. Network Security Threat Level: Low / CVSS Base Score : 2 (AV:L/AC:H/Au:R/C:P/A:P/I:P/B:N) Networks Security ID: 13200 Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |