what you don't know can hurt you

ms01-019

ms01-019
Posted Mar 28, 2001

Microsoft Security Advisory MS01-019 - Compressed folders, included with Windows ME and Plus 98, has an implementation flaw which records the plain text password used to encrypt the folder in c:\windows\dynazip.log. Microsoft FAQ on this issue available here.

systems | windows, me
MD5 | cc8eb4e5956d61f07cbbee03232eb4d0

ms01-019

Change Mirror Download
The following is a Security  Bulletin from the Microsoft Product Security
Notification Service.

Please do not reply to this message, as it was sent from an unattended
mailbox.
********************************

-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------
Title: Passwords for Compressed Folders are Recoverable
Date: 28 March 2001
Software: Plus! 98 and Windows Me
Impact: Data compression passwords can be recovered.
Bulletin: MS01-019

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS01-019.asp.
- ----------------------------------------------------------------------

Issue:
======
Plus! 98, an optional package that extends Windows 98 and Windows 98
Second Edition, introduced a data compression feature called
Compressed Folders that was also included in Windows Me. For
interoperability with leading third-party compression tools, it
provides a password protection option for folders that have been
compressed. However, due to a flaw in the package's implementation,
the passwords used to protect the folders are recorded in a file on
the user's system. If an attacker gained access to an affected
machine
on which password-protected folders were stored, she could learn the
passwords and access the files.

It is important to understand that, although this flaw does
constitute
a security vulnerability, the password protection feature is not
intended to provide strong security. It was included in the products
to enable interoperability with password-protection features in other
third-party data compression products, and is only intended to
provide
protection against casual inspection. Customers who need strong
protection for files should use Windows(r) 2000.

The patch will prevent passwords from being written to the user's
system in the future. However, as discussed in the FAQ, after
applying
the patch, it is important to also delete c:\windows\dynazip.log, in
order to ensure that all previously-recorded passwords are deleted.

Mitigating Factors:
====================
- The password at issue here is not related in any way to the
user's network logon password. It is used solely for
password-protecting compressed folders.
- An attacker would require physical access to an affected system
in order to recover the password, or the owner of the machine
would need to have deliberately shared out the c:\windows folder.

Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
Security Bulletin
http://www.microsoft.com/technet/security/bulletin/ms01-019.asp
for information on obtaining this patch.


- ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES
WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL,
LOSS
OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY
NOT APPLY.



-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.5.3

iQEVAwUBOsH+ao0ZSRQxA/UrAQH/Qwf/TmVnowE1qyHinH09UEj4jVRtzi3v8qV7
Lq1uNXbfELUvukakJvwz0aJTTby2t1XLcBt8XBhnG71lLbbObLelenxzxGfb2LKT
E1l+Bb8iidVhPWbjNYy5MJk12y06syu7tJzcjxcr4JjKgAvorWJ0egN7VQQC9qQJ
bVyAtps7bSgC+0s0UpVAiLCn0pfNyKuOIlbyFP4pWFmlM1fxaL4lC5L1jskwnHAX
Hn8U/JhZXMuxJS9QymTmF5GCjEaJijL1iKSOtaB+CC98bOpbwd3IOzt1mKUlkbU2
IZhLZrT95iPYoYPYgxM6WXQSE5puvlTr7OotmvWfBpCOGcyK7NyHFw==
=VTOE
-----END PGP SIGNATURE-----

*******************************************************************
You have received this e-mail bulletin as a result of your registration
to the Microsoft Product Security Notification Service. You may
unsubscribe from this e-mail notification service at any time by sending
an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST@ANNOUNCE.MICROSOFT.COM
The subject line and message body are not used in processing the request,
and can be anything you like.

To verify the digital signature on this bulletin, please download our PGP
key at http://www.microsoft.com/technet/security/notify.asp.

For more information on the Microsoft Security Notification Service
please visit http://www.microsoft.com/technet/security/notify.asp. For
security-related information about Microsoft products, please visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

March 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    15 Files
  • 2
    Mar 2nd
    5 Files
  • 3
    Mar 3rd
    3 Files
  • 4
    Mar 4th
    25 Files
  • 5
    Mar 5th
    20 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    12 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    4 Files
  • 11
    Mar 11th
    23 Files
  • 12
    Mar 12th
    12 Files
  • 13
    Mar 13th
    12 Files
  • 14
    Mar 14th
    19 Files
  • 15
    Mar 15th
    12 Files
  • 16
    Mar 16th
    3 Files
  • 17
    Mar 17th
    1 Files
  • 18
    Mar 18th
    15 Files
  • 19
    Mar 19th
    22 Files
  • 20
    Mar 20th
    14 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    8 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close