Re: Trillian weakly encrypts saved passwords

From: jelmer (jkuperusat_private)
Date: Mon Sep 09 2002 - 14:34:35 PDT

  • Next message: Kilian CAVALOTTI: "Re: Small bug crashes OE"

    Not really relavant as even when it would be encrypted with MD5 or whatever
    one could just copy and use the ini file your own pc.
    
    A bigger problem imho is that the location is known and the content is
    textual, with all the recent local file reading exploits in msie this is
    nasty, I was already sent sample code for this a couple of weeks ago after i
    posted the xmldso thingie
    
    --
      jelmer
    
    
    ----- Original Message -----
    From: "Evan Nemerson" <enemerson@coeus-group.com>
    To: <bugtraqat_private>; <vulnwatchat_private>;
    <submissionsat_private>; <newsat_private>
    Sent: Monday, September 09, 2002 11:20 AM
    Subject: Trillian weakly encrypts saved passwords
    
    
    > Software:
    > Trillian 0.73, possibly other versions.
    >
    > Issue:
    > Weak "encryption" of saved passwords.
    >
    > Impact:
    > Decryption of saved passwords.
    >
    > Vendor notified:
    > 3 Sept., 2002. No response.
    >
    > Severity:
    > Medium. ish. The program only works locally, and only if the subject
    > has saved their password, and really if someone can get into your AIM
    > account, how earth-shattering is that??? However, since a lot of people
    use
    > the same password for everything...
    >
    > ---------------------
    >
    > Trillian is, according to trillian.cc, "...everything you need for instant
    > messaging. Connect to ICQ®, AOL Instant Messenger(SM), MSN Messenger,
    Yahoo!
    > Messenger and IRC in a single, sleek and slim interface."
    >
    > Upon examination of the Trillian directory (which defaults to C:\Program
    > Files\Trillian\ ), it appears that passwords are stored in ini files that
    are
    > located in {Path to Trillian}\users\{WindowsLogon}. The passwords are
    > encrypted using a simple XOR with a key apparently uniform throughout
    every
    > installation.
    >
    > The attached program takes, as command line argument(s), path(s) to these
    INI
    > files. It will then display a list of usernames, "encrypted" passwords,
    and
    > plaintext passwords.
    >
    >
    > Evan Nemerson
    > enemerson@coeus-group.com
    > http://www.coeus-group.com
    >
    >
    >
    >
    



    This archive was generated by hypermail 2b30 : Tue Sep 10 2002 - 09:56:37 PDT