TheGreenBowVPN, Login Credentials Disclosure
Hi there,
###############################################
TheGreenBow IPSec VPN Client Login Credentials Information Disclosure
Vulnerability
Informations
Risk: Low
Typology: Local
Date: 30/03/2008
Product: TheGreenBow IPSec VPN Client
Version: 4.10.010
Vendor: http://www.thegreenbow.com/vpn.html
Vendor Status: 29/03/2008 ? Vendor Informed
30/03/2008 - Reply from The Vendor
31/03/200/ - Patch Released
Discovered By: Giuseppe `Evilcry` Bonfa'
Description
TheGreenBow IPSec VPN Client is an on demand IPSec VPN Client, compliant with
most popular VPN gateways and with network tools to deploy security in large
and medium enterprises. Highly efficient and easy to configure, the IPSec VPN
Client also allows peer-to-peer VPN.
PoC
TheGreenBow IPSec VPN Client 4.10.010 is prone to a Login Credentials that
could expose local users of TheGreenBow to a leak of Sensitive Informations,
specifically an attacker could Carve, Login and Certificates used by the user,
cause they are stored in clear in memory. This may lead complete User
Impersonation.
Attackers can exploit this issue to harvest VPN login credentials and gain
unauthorized access to networks and resources protected by the VPN.
All informations are stored in the meomory image of the process 'Tgbike.exe',
so with a basical Process Memory Dumper.
So we can identify some keywords to use for Credentials Carving:
Xuser = ??
Xpassword = ??
# ==================== CERTIFICATES ====================
-Client-Private-Key]
#############################
A PDF version of the Advisory is available here:
http://evilcry.altervista.org/tuts/theGreenBow.pdf
Regards,
Giuseppe 'Evilcry' Bonfa'