eSeSIX Thintune Client Remote Password Disclosure

2004-07-24T10:52:51
ID OSVDB:8247
Type osvdb
Reporter Dirk Loss(dirk.loss@it-consult.net)
Modified 2004-07-24T10:52:51

Description

Vulnerability Description

The issue is due to the Keeper library which is used to store all JStream configuration settings, including saved user names and passwords (in plaintext) for RDP and ICA connections and passwords for the local VNC server, the JStream control center, and the screensaver. The JStream configuration settings are stored in the '/root/.keeper/' directory and its sub-directories. By browsing the local filesystem or by using the "getreg" command, a remote attacker could gain access to plaintext passwords, resulting in a loss of confidentiality.

Solution Description

Upgrade to version 2.4.39 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

The issue is due to the Keeper library which is used to store all JStream configuration settings, including saved user names and passwords (in plaintext) for RDP and ICA connections and passwords for the local VNC server, the JStream control center, and the screensaver. The JStream configuration settings are stored in the '/root/.keeper/' directory and its sub-directories. By browsing the local filesystem or by using the "getreg" command, a remote attacker could gain access to plaintext passwords, resulting in a loss of confidentiality.

References:

Vendor URL: http://www.thintune.com/en/index.htm Security Tracker: 1010770 Secunia Advisory ID:12154 Related OSVDB ID: 8249 Related OSVDB ID: 8250 Related OSVDB ID: 8246 Related OSVDB ID: 8248 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-07/0273.html ISS X-Force ID: 16795 Bugtraq ID: 10794