TITLE: Spy Sweeper Enterprise Password Information Disclosure Vulnerability SECUNIA ADVISORY ID: SA13198 VERIFY ADVISORY: http://secunia.com/advisories/13198/ CRITICAL: Less critical IMPACT: Exposure of sensitive information WHERE: Local system SOFTWARE: Spy Sweeper Enterprise 1.x http://secunia.com/product/4256/ DESCRIPTION: Frank Mileto has discovered a vulnerability in Spy Sweeper Enterprise, which can be exploited by malicious, local users to disclose sensitive information. The problem is that the administrative password used for overriding settings from client systems is stored in clear text in a location in the registry, which is readable by all users. This can be exploited by retrieving the value of "ap" under the registry key: "HKLM\SOFTWARE\Webroot\Enterprise\Spy Sweeper". The vulnerability has been confirmed in version 1.5.1.3698. Other versions may also be affected. SOLUTION: Change the permissions on the affected key. This may affect functionality. Grant only trusted users access to vulnerable systems. PROVIDED AND/OR DISCOVERED BY: Frank Mileto ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------