Lucene search

K
exploitdb@stakeEDB-ID:20241
HistorySep 26, 2000 - 12:00 a.m.

Palm OS 3.5.2 - Weak Encryption

2000-09-2600:00:00
@stake
www.exploit-db.com
24

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/1715/info

Palm OS is shipped with a security feature which enables a user to set password protection on various applications.The HotSync process allows a user to connect to a machine on the network through their Palm device. This process involves the device to send the encoded password to the HotSync Manager or HotSync Network Server on the network. The purpose of this transmission is to verify the password protection is still enabled when applications are being accessed from the network.

The encoded password block is stored in the 'Unsaved Preferences' database on the Palm device. Due to a weak encryption scheme, it is possible to decrypt the password block into the actual ASCII format with the use of an exploit tool. Physical access to the device is required in order to exploit this vulnerability.

Successful exploitation yields unauthorized access to private data. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20241-1.zip

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20241-2.zip

AI Score

7.4

Confidence

Low

Related for EDB-ID:20241