Secunia Security Advisory - Frank Mileto has discovered a vulnerability in Spy Sweeper Enterprise, which can be exploited by malicious, local users to disclose sensitive information.
d4ec931c32eac56df2a1ec5fc9724dd68008d82a99ecc7e79baba9771efa06ba
TITLE:
Spy Sweeper Enterprise Password Information Disclosure Vulnerability
SECUNIA ADVISORY ID:
SA13198
VERIFY ADVISORY:
http://secunia.com/advisories/13198/
CRITICAL:
Less critical
IMPACT:
Exposure of sensitive information
WHERE:
Local system
SOFTWARE:
Spy Sweeper Enterprise 1.x
http://secunia.com/product/4256/
DESCRIPTION:
Frank Mileto has discovered a vulnerability in Spy Sweeper
Enterprise, which can be exploited by malicious, local users to
disclose sensitive information.
The problem is that the administrative password used for overriding
settings from client systems is stored in clear text in a location in
the registry, which is readable by all users. This can be exploited by
retrieving the value of "ap" under the registry key:
"HKLM\SOFTWARE\Webroot\Enterprise\Spy Sweeper".
The vulnerability has been confirmed in version 1.5.1.3698. Other
versions may also be affected.
SOLUTION:
Change the permissions on the affected key. This may affect
functionality.
Grant only trusted users access to vulnerable systems.
PROVIDED AND/OR DISCOVERED BY:
Frank Mileto
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------