Microsoft Expression Media Plaintext Password Storage Weakness
BID:25996
Info
Microsoft Expression Media Plaintext Password Storage Weakness
| Bugtraq ID: | 25996 |
| Class: | Design Error |
| CVE: |
CVE-2007-5470 |
| Remote: | No |
| Local: | Yes |
| Published: | Sep 20 2007 12:00AM |
| Updated: | Jan 04 2008 09:49PM |
| Credit: | Microsoft disclosed this information. |
| Vulnerable: |
Microsoft Expression Media 1 SP1 |
| Not Vulnerable: | |
Discussion
Microsoft Expression Media Plaintext Password Storage Weakness
Microsoft Expression Media is prone to a weakness because passwords are stored in plain-text format. This issue stems from a design error in the catalog password-protection feature.
Attackers could use this issue in conjunction with other vulnerabilities in a host to gain access to user authentication credentials. This poses an additional risk since users may recycle credentials across multiple services.
Microsoft Expression Media is prone to a weakness because passwords are stored in plain-text format. This issue stems from a design error in the catalog password-protection feature.
Attackers could use this issue in conjunction with other vulnerabilities in a host to gain access to user authentication credentials. This poses an additional risk since users may recycle credentials across multiple services.
Exploit / POC
Microsoft Expression Media Plaintext Password Storage Weakness
An exploit is not required.
An exploit is not required.
Solution / Fix
Microsoft Expression Media Plaintext Password Storage Weakness
Solution:
The vendor has released a knowledgebase article detailing this weakness. Please see the references for more information.
Solution:
The vendor has released a knowledgebase article detailing this weakness. Please see the references for more information.
References
Microsoft Expression Media Plaintext Password Storage Weakness
References:
References: