search menu icon-carat-right cmu-wordmark

CERT Coordination Center

CREDANT Mobile Guardian Shield fails to remove credentials from memory

Vulnerability Note VU#821865

Original Release Date: 2007-06-01 | Last Revised: 2007-06-01

Overview

CREDANT Mobile Guardian Shield fails to properly remove credentials from memory, which may allow an attacker to obtain access to the Windows domain and encrypted drive contents.

Description

CREDANT Mobile Guardian (CMG) Shield is a component of Mobile Guardian Enterprise Edition. CMG Shield provides policy-based encryption of specified files. CMG Shield fails to properly clear credentials out of system memory. The default configuration for CMG Shield does not encrypt the Windows pagefile, which means that the credentials may be written to disk. Please see the CREDANT vendor statement below in this vulnerability note for more details.

Impact

An attacker with access to the contents of system memory may be able to retrieve the user's credentials, which can allow access to encrypted files.

Solution

Apply an update

This issue is addressed in CMG Enterprise Edition 5.2.1 SP1, which was released on May 1, 2007. Please see the CREDANT support site to obtain the update. Details for this vulnerability are available in the support post titled "Vulnerability in Credant Mobile Guardian Shield for Windows."

Vendor Information

821865
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Michael Iacovacci for reporting this vulnerability.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2007-2883
Severity Metric: 0.49
Date Public: 2007-05-24
Date First Published: 2007-06-01
Date Last Updated: 2007-06-01 14:16 UTC
Document Revision: 4

Sponsored by CISA.