DBTools' DBManager Information Leak Vulnerability (fwd)

From: Vince Vielhaber <vev(at)michvhf(dot)com>
To: pgsql-hackers(at)postgreSQL(dot)org
Subject: DBTools' DBManager Information Leak Vulnerability (fwd)
Date: 2003-03-07 17:03:00
Message-ID: Pine.BSF.4.44.0303071202300.39781-100000@paprika.michvhf.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers


FYI.

Vince.
--
Fast, inexpensive internet service 56k and beyond! http://www.pop4.net/
http://www.meanstreamradio.com http://www.unknown-artists.com
Internet radio: It's not file sharing, it's just radio.

---------- Forwarded message ----------
Date: Fri, 7 Mar 2003 04:08:30 -0300
From: Ignacio Vazquez <infosecmanager(at)centaura(dot)com(dot)ar>
To: bugtraq(at)securityfocus(dot)com
Subject: DBTools' DBManager Information Leak Vulnerability

Centaura Technologies Security Research Lab Advisory

Product Name: DBTools DBManager Professional
Systems: Windows 9x/NT/2000/2003 Server
Severity: Medium
Remote: No
Category: Information Leak
Vendor URL: http://www.dbtools.com.br
Advisory Author: Ignacio Vazquez
Advisory URL: http://www.centaura.com.ar/infosec/adv/dbmanagerpro.txt
Revised-Date: March 7, 2003
Advisory Code: CTADVILB004

.:Introduction

"The DBManager Professional is the most powerful application
for MySQL and PostgreSQL It is rich of features. It comes in
two editions to help you choose the one that will fit your needs:
Freeware and Enterprise"

.: Impact

Any local user can retrieve MySQL and PostgreSQL connection information
like DB hosts, usernames and passwords without any restriction.

.: Description

DBTools DBManager Pro stores its link information in the
sys_servers table located in catalog.mdb (MS JET database) file usually
within the "DATA" directory in the program folder.
(C:\Program Files\DBTools Software\DBManager Professional\DATA)

This table contains server_id, server_name, server_type, host, and port,
user and password fields, from where a local attacker can gain useful
information regarding the db engines.

The fields in this database are NOT encrypted, letting any user with
read access retrieve this data. catalog.mdb is readable to all users by
default so virtually any user within the system can open this file.

.: Official Fix Information

The vendor has been contacted but no fix has been released yet.

-----

Ignacio Vazquez
<ivazquez(at)centaura(dot)com(dot)ar>

Director of Technology
Security Labs Manager

Centaura Technologies
http://www.centaura.com.ar

Browse pgsql-hackers by date

  From Date Subject
Next Message mlw 2003-03-07 17:04:57 What's up with www.postgresql.org?
Previous Message Rod Taylor 2003-03-07 16:35:23 Re: [PATCHES] ALTER SEQUENCE