DameWare Mini Remote Control Authentication Credentials Persistence Weakness

low Nessus Plugin ID 18118

Synopsis

The remote Windows host contains an application that is affected by an information disclosure issue.

Description

According to its version number, the copy of DameWare Mini Remote Control installed on the remote host allows a local user to recover authentication credentials because the application stores sensitive information in memory as plaintext - username, password, hostname, etc in the case of the 'DWRCC' client process and username (but not password) and authentication type in the case of the 'DWRCS' server process.

Solution

Upgrade to DameWare Mini Remote Control 3.80 / 4.9 or later.

See Also

https://seclists.org/bugtraq/2005/Apr/227

http://www.nessus.org/u?60814edd

Plugin Details

Severity: Low

ID: 18118

File Name: dameware_mini_remote_control_credential_exposure.nasl

Version: 1.22

Type: local

Agent: windows

Family: Windows

Published: 4/22/2005

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:dameware:mini_remote_control

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Patch Publication Date: 4/5/2005

Vulnerability Publication Date: 4/5/2005

Reference Information

CVE: CVE-2005-1166

BID: 13199