Home / vulnerabilities greenbow-memory.txt
Posted on 08 April 2008
Source : packetstormsecurity.org Link
Hi there,
###############################################
TheGreenBow IPSec VPN Client Login Credentials Information Disclosure Vulnerability
Informations
Risk: Low
Typology: Local
Date: 30/03/2008
Product: TheGreenBow IPSec VPN Client
Version: 4.10.010
Vendor: http://www.thegreenbow.com/vpn.html
30/03/2008 - Reply from The Vendor
31/03/200/ - Patch Released
Discovered By: Giuseppe 'Evilcry' Bonfa'
Description
TheGreenBow IPSec VPN Client is an on demand IPSec VPN Client, compliant with most popular VPN gateways and with network tools to deploy security in large and medium enterprises. Highly efficient and easy to configure, the IPSec VPN Client also allows peer-to-peer VPN.
PoC
TheGreenBow IPSec VPN Client 4.10.010 is prone to a Login Credentials that could expose local users of TheGreenBow to a leak of Sensitive Informations, specifically an attacker could Carve, Login and Certificates used by the user, cause they are stored in clear in memory. This may lead complete User Impersonation.
Attackers can exploit this issue to harvest VPN login credentials and gain unauthorized access to networks and resources protected by the VPN.
All informations are stored in the meomory image of the process 'Tgbike.exe', so with a basical Process Memory Dumper.
So we can identify some keywords to use for Credentials Carving:
# ==================== CERTIFICATES ====================
-Client-Private-Key]
#############################
A PDF version of the Advisory is available here:
http://evilcry.altervista.org/tuts/theGreenBow.pdf
Regards,
Giuseppe 'Evilcry' Bonfa'