Telecommunication Software SAMwin Contact Center Suite 5.1 Password SAMwinLIBVB.dll passwordScramble 弱身份验证

Telecommunication Software SAMwin Contact Center Suite 5.1中曾发现分类为致命的漏洞。 此漏洞会影响功能 passwordScrambleSAMwinLIBVB.dll的组件Password Handler。 手动调试的不合法输入可导致 弱身份验证。 使用CWE来声明会导致 CWE-287 的问题。 此漏洞的脆弱性 2014-03-13由公示人Tobias Ospelt and Max Moser、公示人所属公司modzero AG、公示人身份MZ-13-07、公示人类型为公告 (Website)所公布。 索取公告的网址是modzero.ch。 与供应商合作公开发布。 该漏洞被命名为CVE-2013-10004, 可以发起远程攻击, 有技术细节可用。 没有可利用漏洞。 目前漏洞的结构决定了可能的价格范围为美元价USD $0-$5k。 它被宣布为未定义。 该漏洞至少在174日被作为非公开零日攻击。 估计零日攻击的地下价格约为$0-$5k。 升级到版本6.2能够解决此问题。 建议对受到影响的组件升级。 该漏洞被披露后,远在此前发表过可能的缓解措施。

字段2014-04-03 17時21分2019-03-31 21時58分2022-05-24 15時15分
cvss3_vuldb_rlOOO
cvss3_vuldb_rcRRR
0day_days174174174
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prNNN
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aNNN
vendorTelecommunication SoftwareTelecommunication SoftwareTelecommunication Software
nameSAMwin Contact Center SuiteSAMwin Contact Center SuiteSAMwin Contact Center Suite
version5.15.15.1
componentPassword HandlerPassword HandlerPassword Handler
librarySAMwinLIBVB.dllSAMwinLIBVB.dllSAMwinLIBVB.dll
functionpasswordScramblepasswordScramblepasswordScramble
affectedlistTelecommunication Software SAMwin Contact Center Suite 5.1 Telecommunication Software SAMwin Agent 5.01.19.06Telecommunication Software SAMwin Contact Center Suite 5.1 Telecommunication Software SAMwin Agent 5.01.19.06Telecommunication Software SAMwin Contact Center Suite 5.1 Telecommunication Software SAMwin Agent 5.01.19.06
vendorinformdate137963520013796352001379635200
risk111
historic000
cvss2_vuldb_basescore5.85.85.8
cvss2_vuldb_tempscore4.84.84.8
cvss2_vuldb_avNNN
cvss2_vuldb_acMMM
cvss2_vuldb_auNNN
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiNNN
cvss3_meta_basescore6.56.56.5
cvss3_meta_tempscore6.06.06.0
cvss3_vuldb_basescore6.56.56.5
cvss3_vuldb_tempscore6.06.06.0
sourcecodevoid function passwordScramble n = strlen(pwd) pwd = toupper(pwd) hashsum = 0 for (i = 0; i < n; i++) { hashsum += (i+1) * pwd[i]; } return hashsumvoid function passwordScramble n = strlen(pwd) pwd = toupper(pwd) hashsum = 0 for (i = 0; i < n; i++) { hashsum += (i+1) * pwd[i]; } return hashsumvoid function passwordScramble n = strlen(pwd) pwd = toupper(pwd) hashsum = 0 for (i = 0; i < n; i++) { hashsum += (i+1) * pwd[i]; } return hashsum
advisoryquoteThe probability that a certain hash value occurs is highly non-uniform (...) It roughly resembles a slightly skewed normal distribution centered around 3700 with a standard deviation of about 450. 90% of all possible password inputs will result in hash values between 3000 and 4500. The odds that a randomly chosen password from the 5.44 * 10^19 possible values will have the exact hash value 3700 is about 1:1138. An attacker is able to exploit this statistical property to speed up a brute-force attack: he constructs a list of password candidates with exactly one password for every possible hash value. Optimally, he guesses candidates from this list in order of descending probability.The probability that a certain hash value occurs is highly non-uniform (...) It roughly resembles a slightly skewed normal distribution centered around 3700 with a standard deviation of about 450. 90% of all possible password inputs will result in hash values between 3000 and 4500. The odds that a randomly chosen password from the 5.44 * 10^19 possible values will have the exact hash value 3700 is about 1:1138. An attacker is able to exploit this statistical property to speed up a brute-force attack: he constructs a list of password candidates with exactly one password for every possible hash value. Optimally, he guesses candidates from this list in order of descending probability.The probability that a certain hash value occurs is highly non-uniform (...) It roughly resembles a slightly skewed normal distribution centered around 3700 with a standard deviation of about 450. 90% of all possible password inputs will result in hash values between 3000 and 4500. The odds that a randomly chosen password from the 5.44 * 10^19 possible values will have the exact hash value 3700 is about 1:1138. An attacker is able to exploit this statistical property to speed up a brute-force attack: he constructs a list of password candidates with exactly one password for every possible hash value. Optimally, he guesses candidates from this list in order of descending probability.
date1394668800 (2014-03-13)1394668800 (2014-03-13)1394668800 (2014-03-13)
locationWebsiteWebsiteWebsite
typeAdvisoryAdvisoryAdvisory
urlhttp://www.modzero.ch/advisories/MZ-13-07_SAMwin_Collisions.txthttp://www.modzero.ch/advisories/MZ-13-07_SAMwin_Collisions.txthttp://www.modzero.ch/advisories/MZ-13-07_SAMwin_Collisions.txt
identifierMZ-13-07MZ-13-07MZ-13-07
coordination111
person_nameTobias Ospelt/Max MoserTobias Ospelt/Max MoserTobias Ospelt/Max Moser
company_namemodzero AGmodzero AGmodzero AG
confirm_date1379980800 (2013-09-24)1379980800 (2013-09-24)1379980800 (2013-09-24)
price_0day$0-$5k$0-$5k$0-$5k
name升级升级升级
upgrade_version6.26.26.2
advisoryquoteIt is recommended to limit the number of possible password tries for all accounts. The vendor will not provide any fixes for previous versions.It is recommended to limit the number of possible password tries for all accounts. The vendor will not provide any fixes for previous versions.It is recommended to limit the number of possible password tries for all accounts. The vendor will not provide any fixes for previous versions.
seealso12789 1278812789 1278812789 12788
cvss2_vuldb_eNDNDND
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_rcURURUR
cvss3_vuldb_eXXX
cwe0287 (弱身份验证)287 (弱身份验证)
cveCVE-2013-10004
responsibleVulDB

Interested in the pricing of exploits?

See the underground prices here!