DameWare Mini Remote Control Authentication Credentials Persistence Weakness

Low Nessus Plugin ID 18118


The remote Windows host contains an application that is affected by an information disclosure issue.


According to its version number, the copy of DameWare Mini Remote Control installed on the remote host allows a local user to recover authentication credentials because the application stores sensitive information in memory as plaintext - username, password, hostname, etc in the case of the 'DWRCC' client process and username (but not password) and authentication type in the case of the 'DWRCS' server process.


Upgrade to DameWare Mini Remote Control 3.80 / 4.9 or later.

See Also



Plugin Details

Severity: Low

ID: 18118

File Name: dameware_mini_remote_control_credential_exposure.nasl

Version: $Revision: 1.20 $

Type: local

Agent: windows

Family: Windows

Published: 2005/04/22

Modified: 2016/10/10

Dependencies: 13855

Risk Information

Risk Factor: Low


Base Score: 2.1

Temporal Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:ND/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/a:dameware:mini_remote_control

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 2005/04/05

Vulnerability Publication Date: 2005/04/05

Reference Information

CVE: CVE-2005-1166

BID: 13199

OSVDB: 15741