ID CVE-2005-0809 Type cve Reporter NVD Modified 2008-09-05T16:47:22
Description
NotifyLink, when configured for client key retrieval, allows remote attackers to obtain AES keys via a direct request to /hwp/get.asp, then uses a weak encryption scheme (fixed byte reordering) to protect the key, which allows remote attackers to obtain the key via a brute force attack.
{"href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0809", "history": [], "references": ["http://www.securityfocus.com/bid/12843", "http://www.kb.cert.org/vuls/id/581068"], "lastseen": "2016-09-03T05:13:54", "bulletinFamily": "NVD", "title": "CVE-2005-0809", "cpe": ["cpe:/a:notify_technology:notifylink:enterprise_server"], "viewCount": 0, "id": "CVE-2005-0809", "hash": "ee26e4d92f05fdb2c6d1094a883b2bbccf5fd3df3dc72af5f6ca25cefe104d23", "description": "NotifyLink, when configured for client key retrieval, allows remote attackers to obtain AES keys via a direct request to /hwp/get.asp, then uses a weak encryption scheme (fixed byte reordering) to protect the key, which allows remote attackers to obtain the key via a brute force attack.", "edition": 1, "assessment": {"name": "", "href": "", "system": ""}, "cvelist": ["CVE-2005-0809"], "scanner": [], "modified": "2008-09-05T16:47:22", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "objectVersion": "1.2", "reporter": "NVD", "type": "cve", "published": "2005-05-02T00:00:00", "enchantments": {"score": {"value": 5.0, "vector": "NONE", "modified": "2016-09-03T05:13:54"}, "dependencies": {"references": [{"type": "cert", "idList": ["VU:581068"]}], "modified": "2016-09-03T05:13:54"}, "vulnersScore": 5.0}}
{"cert": [{"lastseen": "2018-12-25T20:19:38", "bulletinFamily": "info", "description": "### Overview \n\nThe NotifyLink key exchange protocol contains a vulnerability that significantly reduces the strength of cryptographic keys used to encrypt mail messages.\n\n### Description \n\nNotify Technology [NotifyLink Enterprise Server](<http://notifylink.notify.net/>) allows users to synchronize e-mail between a PDA and a mail server. The application consists of a PDA-specific client and the NotifyLink server, which acts as a proxy between the client and the mail server(s) the user wants to check. For each e-mail account to be monitored, the user provides mail server credentials that are stored on the NotifyLink server and used to periodically check for mail. When new mail arrives, the NotifyLink server stores a reference to the message ID. Depending on the configuration, the message is either sent to the device via SMS (\"Push\" mode), or the device periodically checks a link on the NotifyLink web server to retrieve the message (\"Poll\" mode). The product supports multiple PDA platforms and multiple e-mail servers, including IMAP, POP, Microsoft Exchange, and Novell GroupWise.\n\nNotifyLink uses AES keys to encrypt the mail messages that are exchanged between the PDA and NotifyLink server. These keys are stored on the server in a table named ClientDevices, which is protected from unauthenticated access. If the key is not transferred to the PDA manually, the client can retrieve it from the server using an unauthenticated HTTP post to `/hwp/get.asp`. When keys are transmitted using this method, the server uses a fixed byte reordering scheme to obfuscate the key. This scheme significantly reduces the strength of the key material, providing protection against only the most casual observer. In addition, any attacker in possession of the source code for get.asp will be able to determine the fixed scheme, making the reversal operation trivial. \n \n--- \n \n### Impact \n\nThis vulnerability significantly reduces the strength of cryptographic keys used to encrypt mail messages. \n \n--- \n \n### Solution \n \n--- \n \n**Use Manual Key Generation** \n \nConfigure NotifyLink to use \"Manual Key Generation.\" When NotifyLink is configured this way, the obfuscated key will not be available to an attacker via `/hwp/get.asp`. \n \n--- \n \n### Vendor Information\n\n581068\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Vendor has issued information\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n__ Affected __ Unknown __ Unaffected \n\n**Javascript is disabled. Click here to view vendors.**\n\n### __ Notify Technology \n\nNotified: March 29, 2004 Updated: May 03, 2004 \n\n### Status\n\n__ Vulnerable\n\n### Vendor Statement\n\nNo statement is currently available from the vendor regarding this vulnerability.\n\n### Vendor Information\n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nThe CERT/CC has no additional comments at this time.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23581068 Feedback>).\n\n \n\n\n### CVSS Metrics \n\nGroup | Score | Vector \n---|---|--- \nBase | N/A | N/A \nTemporal | N/A | N/A \nEnvironmental | | N/A \n \n \n\n\n### References \n\n * <http://notifylink.notify.net>\n * <http://secunia.com/advisories/14617/>\n * <http://www.securityfocus.com/bid/12843>\n\n### Credit\n\nWe thank the NOAA NCIRT Lab for their discovery and analysis of this vulnerability. \n\nThis document was written by Jeffrey P Lanza and Will Dormann. It is based on analysis provided by the NOAA NCIRT Lab. \n\n### Other Information\n\n**CVE IDs:** | [CVE-2005-0809](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0809>) \n---|--- \n**Date Public:** | 2005-03-17 \n**Date First Published:** | 2005-03-17 \n**Date Last Updated: ** | 2005-04-28 15:13 UTC \n**Document Revision: ** | 32 \n", "modified": "2005-04-28T15:13:00", "published": "2005-03-17T00:00:00", "id": "VU:581068", "href": "https://www.kb.cert.org/vuls/id/581068", "type": "cert", "title": "NotifyLink server provides inadequate protection for cryptographic key material", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}