what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ONCommandCCM.txt

ONCommandCCM.txt
Posted Sep 21, 2004
Authored by Jonas Olsson

Four default username/password pairs are present in the Sybase database backend used by ON Command CCM 5.x servers. One of the username/password pairs is publicly available in a knowledgebase article at ON Technology's web site. The database accounts can be used to read and modify all data in the CCM database.

tags | advisory, web
SHA-256 | dfc05a01176771202a8e0449359f5636358366e9a762b44fdb67cb186174f15a

ONCommandCCM.txt

Change Mirror Download

Security advisory
=================
Advisory name: Default username/password pairs in ON Command CCM 5.x
database backend
Release date: 2004-09-20
Application: ON Command CCM 5.x
Platform: Linux, Solaris, Windows
Severity: An intruder can gain access to all administrator
passwords and other sensitive data for managed systems
Author: Jonas Olsson <jonas@takeit.se>


Summary
-------
Four default username/password pairs are present in the Sybase
database backend used by ON Command CCM 5.x servers. One of the
username/password pairs is publicly available in a knowledgebase
article at ON Technology's web site.

The database accounts can be used to read and modify all data in the
CCM database. The database contains among other things usernames and
passwords for administrative accounts for all managed workstations and
servers. In a default CCM installation the Sybase database server is
reachable from the network on the standard Sybase database port.

Two of the database account passwords are extremely easy to guess.


Vendor information
------------------
Symantec recently bought ON Technology which produces ON Command CCM.

Homepage: http://www.symantec.com/
Vendor informed on: 2004-08-11
Vendor response: Fix available in next release of CCM (version 6.0)
which will be available sometime in 2005.
Advisory mailed: 2004-09-20


Affected products
-----------------
* ON Command CCM version 5.x

We have not been able to verify the problem on earlier versions of ON
Command CCM since we have not had access to the software.


Background
----------
ON Command CCM is a solution for central management of Windows
workstations and servers. It handles unattended OS and software
installation on managed computers. All configuration information for
managed workstations, including passwords for local administrators,
domain administrator passwords if the workstation is joined to a
domain and license keys are stored in the CCM database.

The CCM server software is available for several OSes, including
Solaris, Linux and Windows.


Vulnerability impact
--------------------
Using any of the default database accounts an attacker can easily
retrieve all passwords in clear-text for all systems managed by
CCM. Since this includes the domain administrator password if CCM
handles joining managed systems to a domain (which is usually the
case) this can lead to compromise on both servers and workstations.

Any other sensitive data, such as license keys, is also available from
the CCM database.


Workarounds
-----------
* The passwords can be changed for three of the users. The fourth
user's credentials are used by the CCM server daemons and are
hard-coded in the binaries.

* The Sybase database port can be firewalled locally on the CCM
server, denying access to network requests. Local requests can't be
blocked however.


Contact
-------
AB TakeIT
http://www.takeit.se/
Jonas Olsson <jonas@takeit.se>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close