search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Shortcuts may insecurely store SMB authentication information

Vulnerability Note VU#305294

Original Release Date: 2004-12-13 | Last Revised: 2005-03-17

Overview

SMB authentication information may be stored as plain text within URI shortcuts. As a result, a local attacker may be able read the authentication information and gain access to the share.

Description

SMB is a protocol for sharing data and resources between computers. Many operating systems support accessing SMB shares via URIs of the form:


    smb://domain\&#xsername:password@server\sharename

If a shortcut to a protected SMB share is created, the URI (including the password section) will be stored as plain text within the shortcut. If an attacker can access the properties of the shortcut, they will be able to read the password and may be able to gain access to the protected share.

According to reports, this vulnerability affects the KDE Desktop Environment. However, other applications or operating systems may be affected as well.

Impact

If a local attacker can create (or persuade a user to create) a shortcut to a protected SMB share and then gain access to that shortcut's properties, they will be able to read the SMB share's authentication information and consequently, gain access to the protected SMB share.

Solution

We are currently unaware of a solution to this problem.

Lock Computer


Users are encouraged to lock their computers when they step away from them.

Vendor Information

305294
 

View all 20 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Daniel Fabian.

This document was written by Jeff Gennari.

Other Information

CVE IDs: None
Severity Metric: 1.39
Date Public: 2004-11-29
Date First Published: 2004-12-13
Date Last Updated: 2005-03-17 16:02 UTC
Document Revision: 116

Sponsored by CISA.