exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

dameware_cleartext_pass_storage.txt

dameware_cleartext_pass_storage.txt
Posted Apr 24, 2005
Authored by Jordi Corrales | Site shellsec.net

Dameware stores the username / password of the currently connected user in cleartext somewhere on its heap. (Note: a great number of other remote-access products probably do this as well).

tags | advisory, remote
SHA-256 | 2ba2eb9f10af09f46038b23b0d6cb684ed80a7a6a73113df3a867e99be5817fd

dameware_cleartext_pass_storage.txt

Change Mirror Download
Dameware NT Utilities and MiniRemote Control <= 4.9 vulnerability


- 1 - Introduction

DameWare NT Utilities is an enterprise system management application for Windows NT/2000/XP/2003 which provides an integrated collection of Microsoft Windows NT administration utilities incorporating a centralized interface for remote management of Windows NT/2000/XP/2003 Servers and Workstations

- 2 - Description -

Dameware NT Utilities and Mini Remote Control <= 4.9 have a vulnerability.

NT Utilities
-------------

When the process DNTUS26 located in the remote machine is dumped from memory to a file with PMDump can obtain the user and the password because both are stored in clear-text.
Viewing the event id of windows can know the user connected then only opening the dump file and searching the user can obtain the password looking for any clear-text in the same line of the user.

All utilities (disk,event,groups,open files..cmd view..) are vulnerable but if execute CMD Console (not cmd view) and dump the process, searching the word "Console" can obtain the user,password,remote user and remote host name.

For example

Console:CrowDat:myplaintextpassword:Y:N:Kurobudetsu:TAMICA2000

Mini Remote Control
-------------------

When the process DWRCS (remote machine or server machine) is dumped from memory to a file with PMDump can obtain information of program settings,user name and authentication type but not the password.

When the process DWRCC (client machine or local machine) is dumped from memory to a file with PMDump can obtain all
users,passwords,hostname/ip,alias and domain name stored for connect with alternate credentials, searching the word "sam computers" can find all.

To make easy find the user and password when i tested always find the user and password between a short range of lines. To open the txt files i used Notepad++ but with notepad or wordpad it's very slowly.

User&Password between lines..

41900-42000 in disk,event,groups,open-files,properties... (NT Utilities)
4550-4600 DWRCC (Mini Remote Control Client)
300-400 DWRCS (Mini Remote Control Server)


- 3 - How to fix it

If Dameware fix this bug download update to the new version

- 4 - Vendor Contact

08/04/2005 Notified to dameware

No response from vendor

- 5 - Credits -

Author: Jordi Corrales ( jordi[at]shellsec.net )
Editor: Fernando Ortega ( fernando[at]shellsec.net )
Date: 15/04/2005
Url: http://www.shellsec.net

Vendor: http://www.dameware.com
PMDump: http://ntsecurity.nu/toolbox/pmdump/
Notepad++: http://notepad-plus.sourceforge.net

English Advisory: http://www.shellsec.net/leer_advisory.php?id=7
Spanish Advisory: http://www.shellsec.net/leer_advisory.php?id=6

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close