search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Meridian Prolog Manager uses weak authentication to store and transmit user credentials

Vulnerability Note VU#120593

Original Release Date: 2007-12-17 | Last Revised: 2007-12-19

Overview

Meridian Systems Prolog Manager does not use strong encryption and returns a list of all user credentials when authenticating clients. These behaviors could allow an attacker to obtain user credentials and decrypt passwords.

Description

Meridian Systems Prolog Manager is a set of construction project management tools that are designed to interface with a Microsoft SQL Server.

Prolog Manager administrators can choose to use one of the following methods to encrypt the passwords:

    • no encryption
    • standard encryption
    • enhanced encryption
By default, no encrytion is selected, and Prolog Manager does not use sufficiently strong encryption when standard encryption or enhanced encryption are selected. In addition, when a client logs into Prolog Manager, the authentication credentials of all users in the system are returned to the client. An attacker could obtain credentials by sniffing network traffic or by sending an invalid login request to the Prolog Manager server and capturing the response. The attacker may then be able to decrypt passwords offline.

Impact

An attacker who can intercept network traffic or send an invalid loin request can obtain authentication credentials and decrypt passwords.

Solution

We are currently unaware of a practical solution to this problem.

Use database and network encryption

    • Enabling the enhanced encryption option may increase the effort required for an attacker to decrpt passwords. See the Meridian November 2004 Product Tip for more information about enabling encryption.
    • Using an encrypted VPN or similar technology when accessing the Prolog Manager server may prevent an attacker from sniffing network traffic.

Vendor Information

120593
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Information about this vulnerability was posted on the bugtraq mailing list.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2007-6330
Severity Metric: 1.77
Date Public: 2007-12-11
Date First Published: 2007-12-17
Date Last Updated: 2007-12-19 17:35 UTC
Document Revision: 44

Sponsored by CISA.