what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

safenetVPN.txt

safenetVPN.txt
Posted Feb 23, 2005
Authored by Roy Hills | Site nta-monitor.com

The SafeNet SoftRemote VPN client has an issue where a password is stored as clear text in memory.

tags | advisory
SHA-256 | 4ddf3ab879d0979c09c314bbcf63db87068c3b3d1bffa3e1403cc152a76748af

safenetVPN.txt

Change Mirror Download
SafeNet SoftRemote VPN Client Issue: Clear-text password stored in memory

Summary:

NTA Monitor have discovered a password disclosure issue in the SafeNet
SoftRemote VPN client: The SoftRemote client stores the password in an
obfuscated form in the Windows registry, but it also stores the unencrypted
password in process memory.

The SafeNet SoftRemote VPN client is widely used for remote access IPsec
VPNs. It is available as a product in its own right, and many VPN vendors
also use a badged-up version of the client which they ship with their VPN
product. The issue has been confirmed in both the SoftRemote product, and
also in two badged-up versions. It is suspected that the issue is common
to all versions of the client.

The vendor has been notified of this issue, and have produced a fix which
is expected to be available shortly.

Overview:

While performing a VPN test for a customer, NTA Monitor discovered that the
VPN client that was being used stored the VPN password (pre-shared key)
unencrypted in the memory of the process "IreIKE.exe". It was possible to
recover the password by dumping the process memory to a file with PMDump
(https://ntsecurity.nu/toolbox/pmdump/) or by crashing the system to obtain
a physical memory dump.

The IreIKE.exe process decrypts the pre-shared key as soon as it starts up,
so there is no need to attempt to connect to the VPN server in order to
obtain the password from the client.

The vulnerability was found in both SafeNet version of the client, and also
two badged-up versions, which implies that it is common across all versions
of the client.

The vulnerability allows anyone with access to the client system to obtain
the password. It also allows anyone who has access to the obfuscated
password in the client registry or in a policy file (.spd) to use the VPN
client to obtain the corresponding plain-text password.

The VPN client registry, and also policy files, contain all the other
configuration details needed to gain access to the VPN, such as the
username and IP addresses in plain (unencrypted format). Therefore anyone
with access to the VPN client system, or a policy file, can obtain all of
the required details to access the VPN.

In the memory dump, the plain-text password is visible near to the name of
the connection that it is associated with (e.g. "My Connections\New
Connection"). As the password appears to be at a fixed offset from the
connection name in the memory dump, it would be a simple matter to write a
tool to extract the connection name and password.

Further Information:

For further information, including technical details and screenshots, see:

https://www.nta-monitor.com/news/vpn-flaws/safenet/index.htm

Roy Hills


--
Roy Hills Tel: +44 1634 721855
NTA Monitor Ltd FAX: +44 1634 721844
14 Ashford House, Beaufort Court,
Medway City Estate, Email: Roy.Hills@nta-monitor.com
Rochester, Kent ME2 4FA,
UK WWW: https://www.nta-monitor.com/

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close