exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

TK8Safe305.txt

TK8Safe305.txt
Posted Jul 9, 2006
Authored by Michael Kemp | Site clappymonkey.com

TK8 Safe version 3.0.5 suffers from password management and denial of service issues.

tags | advisory, denial of service
SHA-256 | 2066ed6fb0266e093a12a32e15493170fd9a2feff247d591e08703a04ea8b25a

TK8Safe305.txt

Change Mirror Download
Multiple vulnerabilities in TK8 Safe v.3.0.5

July 3, 2006

----

Summary:
TK8 Safe (www.tk8.com) is a password management application, which stores authentication details (and other sensitive data) in encrypted local folders. A number of issues have been discovered in version 3.0.5 of the application that present a risk to the integrity and availability of stored user data.

Business Impact:
Successful exploitation of the issues discovered could lead to system unavailability, the overwriting of sensitive data, and unrestricted access to sensitive data. Attacks against the application require limited technical knowledge.

Affected products:
TK8 Safe v.3.0.5 Standard and Pro Editions.

----

Description:
TK8 Safe v.3.0.5 allows users to set encrypted data repositories with weak or null passwords.

Remediation:
Assign a strong password to working folders. The vendor is addressing this issue in a forthcoming release (expected delivery date October 2006).

Description:
It is possible for a malicious attacker to brute force the password(s) for protected folder(s). No timeout functionality is instigated, meaning that although it is impossible for a legitimate user to 'lock out' their account, it is possible for a malicious attacker (or an automated agent) to have repeated attempts at directory access.

Remediation:
Upgrade to TK8 Safe v.3.0.6 available from vendor website.

Description:
It is possible for a malicious attacker to overwrite a legitimate directory.

Remdiation:
Upgrade to TK8 Safe v.3.0.6 available from vendor website.

Description:
Insufficient bounds checking is in place within various fields within the application. By entering a string of sufficient length is is possible to create a variety a localised application DoS state.

Remdiation:
Upgrade to TK8 Safe v.3.0.6 available from vendor website.

----

Credit:
Vulnerabilities discovered by Michael Kemp (www.clappymonkey.com).

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close