Lyris ListManager MSDE Weak sa Password

This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.


Synopsis :

The remote database server uses a weak password for one of its
administrative accounts.

Description :

The remote host appears to be running ListManager, a web-based
commercial mailing list management application from Lyris.

The version of ListManager on the remote host was installed using
Microsoft SQL Server Desktop Engine (MSDE) for its database backend
along with a weak password for the 'sa' account - 'lyris' followed by
up to 5 digits. An attacker may be able to discover this password by
means of a brute-force attack and gain administrative access to the
database.

See also :

http://www.nessus.org/u?e252a917
http://seclists.org/fulldisclosure/2005/Dec/374

Solution :

Assign a strong 'sa' password to MSDE and update the setting for
'$sql_password' in ListManager's 'lmcfg.txt' file.

Risk factor :

Medium / CVSS Base Score : 6.5
(CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 20728 (listmanager_msde_weak_sa_password.nasl)

Bugtraq ID:

CVE ID: CVE-2005-4145

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now