Vulnerabilities > CVE-2009-2201 - Cryptographic Issues vulnerability in Apple Xsan 1.0/1.2/1.3

047910
CVSS 2.1 - LOW
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
local
low complexity
apple
CWE-310

Summary

The screensharing feature in the Admin application in Apple Xsan before 2.2 places a cleartext username and password in a URL within an error dialog, which allows physically proximate attackers to obtain credentials by reading this dialog.

Vulnerable Configurations

Part Description Count
Application
Apple
4

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 36385 CVE(CAN) ID: CVE-2009-2201 Xsan是一个企业级的存储网络解决方案,Xsan Admin是用于简化SAN管理的应用。 通过Xsan Admin进行屏幕共享可能会提供包含有用户名和口令的出错对话框,能够查看用户显示的攻击者可以读取明文的用户凭据。 Apple Xsan 2.1.1 厂商补丁: Apple ----- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.apple.com/support/downloads/
idSSV:12316
last seen2017-11-19
modified2009-09-16
published2009-09-16
reporterRoot
titleApple Xsan Admin出错消息信息泄露漏洞