what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

DSR-FSA.txt

DSR-FSA.txt
Posted Jul 6, 2003
Authored by dsr, mercy | Site dtors.net

DTORS Security - First Security Agent, the first screen locking tool for win32 is vulnerable to a local user changing or disabling the password via the system registry.

tags | advisory, local, registry
systems | windows
SHA-256 | 658980c23c1c70311de70e308d4e010c29a4e526b9221aee3b44e87b040fb2ef

DSR-FSA.txt

Change Mirror Download
    DSR - DTORS SECURITY RESEARCH

By: mercy
Date: 30/06/2003
Advisory for: First Security Agent.
First Screen Lock Package.
(http://www.softheap.com/)


About the Product:

"1st Security Agent is an excellent password-protected security utility to
secure Windows-based computers. It works under any Windows platform and offers
an administrative support for controlling which users are allowed to access your
computer and the level of access each user may have."

Description of Vulnerability:

1st Security Agent stores its password settings by default under the Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\SaSkda

It stores two vulnerable settings by default:

LockPwd - stores the passwords in plaintext (Un-encrypted) and writeable.
LockPwdEnabled - stores the value writeable (Modifiable) by all users.

With these two Settings, a user can either:

a.) Read the password set by a user, potentially leading to further compromise of
the system if the password is used more than once.
b.) Change the password to restrict other users from their machines.
c.) Disable Screen Lock.


Example:

Setup screen lock, enter a default password and open up the Registry keys folder.
You will see your specified password in plaintext in the LockPwd key.
Right click on LockPwd and select modify, change the value from the password you
specified and try unlocking your screen. The new password is the effective one.

Right Click LockPwdEnabled and change the Value Data to 0, run the screen lock and
you will not need a password to continue.

Fix:

Until the vendor releases a patch for these vulnerabilities, you should modify user
access privileges, disabling registry editing, and change the world writeable
specifications to something such as Admin.
Isolate your default password, meaning use something that you don’t use for other
applications, this will prevent further privilege escalation.

Contact:

mercy@dtors.net
http://mercy.dtors.net
http://www.dtors.net
irc://irc.dtors.net #dtors
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close