Vulnerability Name:

CVE-2003-0047 (CCN-11197)

Assigned:2003-01-28
Published:2003-01-28
Updated:2016-10-18
Summary:SSH2 clients for VanDyke (1) SecureCRT 4.0.2 and 3.4.7, (2) SecureFX 2.1.2 and 2.0.4, and (3) Entunnel 1.0.2 and earlier, do not clear logon credentials from memory, including plaintext passwords, which could allow attackers with access to memory to steal the SSH credentials.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2003-0046

Source: MITRE
Type: CNA
CVE-2003-0047

Source: MITRE
Type: CNA
CVE-2003-0048

Source: BUGTRAQ
Type: UNKNOWN
20030129 iDEFENSE Security Advisory 01.28.03: SSH2 Clients Insecurely Store Passwords

Source: CCN
Type: SECTRACK ID: 1006010
VanDyke SecureCRT SSH2 Client Software Access Control Bug May Disclose Passwords to Local Users Via Memory

Source: CCN
Type: SECTRACK ID: 1006011
VanDyke SecureFX SSH2 Client Software Access Control Bug May Disclose Passwords to Local Users Via Memory

Source: CCN
Type: SECTRACK ID: 1006012
VanDyke Entunnel SSH2 Client Software Access Control Bug May Disclose Passwords to Local Users Via Memory

Source: CCN
Type: SECTRACK ID: 1006013
AbsoluteTelnet SSH2 Client Software Access Control Bug May Disclose Passwords to Local Users Via Memory

Source: CCN
Type: SECTRACK ID: 1006014
PuTTY SSH2 Client Software Access Control Bug May Disclose Passwords to Local Users Via Memory

Source: CCN
Type: Celestial Software Web site
Celestial Software (maker of the AbsoluteTelnet SSH terminal client)

Source: CCN
Type: PuTTY Web site
PuTTY: a free Win32 telnet/ssh client

Source: MISC
Type: Patch, Vendor Advisory
http://www.idefense.com/advisory/01.28.03.txt

Source: CCN
Type: OSVDB ID: 7685
Van Dyke SSH2 Client Memory Logon Credential Leak

Source: CCN
Type: OSVDB ID: 7686
AbsoluteTelnet SSH2 Client Memory Logon Credential Leak

Source: CCN
Type: OSVDB ID: 7687
PuTTY SSH2 Client Memory Logon Credential Leak

Source: CCN
Type: OSVDB ID: 7688
WinSCP Client Memory Logon Credential Leak

Source: CCN
Type: BID-6724
Putty SSH2 Authentication Password Persistence Weakness

Source: CCN
Type: BID-6725
Celestial Software AbsoluteTelnet SSH2 Authentication Password Persistence Weakness

Source: BID
Type: UNKNOWN
6726

Source: CCN
Type: BID-6726
Van Dyke SecureCRT SSH2 Authentication Password Persistence Weakness

Source: BID
Type: UNKNOWN
6727

Source: CCN
Type: BID-6727
Van Dyke Software SecureFX SSH2 Authentication Password Persistence Weakness

Source: BID
Type: UNKNOWN
6728

Source: CCN
Type: BID-6728
Van Dyke Software Entunnel SSH2 Authentication Password Persistence Weakness

Source: CCN
Type: BID-6732
WinSCP SSH2 Authentication Password Persistence Weakness

Source: SECTRACK
Type: UNKNOWN
1006010

Source: SECTRACK
Type: UNKNOWN
1006011

Source: SECTRACK
Type: UNKNOWN
1006012

Source: CCN
Type: VanDyke Software Web site
VanDyke Software

Source: XF
Type: UNKNOWN
ssh-plaintext-passwords(11197)

Source: CCN
Type: iDEFENSE Security Advisory 01.28.03
SSH2 Clients Insecurely Store Passwords

Vulnerable Configuration:Configuration 1:
  • cpe:/a:van_dyke_technologies:entunnel:*:*:*:*:*:*:*:* (Version <= 1.0.2)
  • OR cpe:/a:van_dyke_technologies:securecrt:3.4.7:*:*:*:*:*:*:*
  • OR cpe:/a:van_dyke_technologies:securecrt:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:van_dyke_technologies:securefx:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:van_dyke_technologies:securefx:2.1.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:putty:putty:0.53b:*:*:*:*:*:*:*
  • OR cpe:/a:winscp:winscp:2.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    van_dyke_technologies entunnel *
    van_dyke_technologies securecrt 3.4.7
    van_dyke_technologies securecrt 4.0.2
    van_dyke_technologies securefx 2.0.4
    van_dyke_technologies securefx 2.1.2
    putty putty 0.53b
    winscp winscp 2.2