Lyris ListManager MSDE Weak sa Password

Medium Nessus Plugin ID 20728


The remote database server uses a weak password for one of its administrative accounts.


The remote host appears to be running ListManager, a web-based commercial mailing list management application from Lyris.

The version of ListManager on the remote host was installed using Microsoft SQL Server Desktop Engine (MSDE) for its database backend along with a weak password for the 'sa' account - 'lyris' followed by up to 5 digits. An attacker may be able to discover this password by means of a brute-force attack and gain administrative access to the database.


Assign a strong 'sa' password to MSDE and update the setting for '$sql_password' in ListManager's 'lmcfg.txt' file.

See Also

Plugin Details

Severity: Medium

ID: 20728

File Name: listmanager_msde_weak_sa_password.nasl

Version: $Revision: 1.19 $

Type: local

Agent: windows

Family: Windows

Published: 2006/01/16

Modified: 2016/10/27

Dependencies: 13855, 10456

Risk Information

Risk Factor: Medium


Base Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

Required KB Items: SMB/name, SMB/login, SMB/password, SMB/registry_full_access, SMB/transport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2005/12/08

Exploitable With

Metasploit (Lyris ListManager MSDE Weak sa Password)

Reference Information

CVE: CVE-2005-4145

OSVDB: 21559