Exploit Palm OS 3.5.2 - Weak Encryption

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
20241
Проверка EDB
  1. Пройдено
Автор
@STAKE
Тип уязвимости
LOCAL
Платформа
PALM_OS
CVE
cve-2000-1008
Дата публикации
2000-09-26
Код:
source: https://www.securityfocus.com/bid/1715/info

Palm OS is shipped with a security feature which enables a user to set password protection on various applications.The HotSync process allows a user to connect to a machine on the network through their Palm device. This process involves the device to send the encoded password to the HotSync Manager or HotSync Network Server on the network. The purpose of this transmission is to verify the password protection is still enabled when applications are being accessed from the network.

The encoded password block is stored in the 'Unsaved Preferences' database on the Palm device. Due to a weak encryption scheme, it is possible to decrypt the password block into the actual ASCII format with the use of an exploit tool. Physical access to the device is required in order to exploit this vulnerability.

Successful exploitation yields unauthorized access to private data. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20241-1.zip

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20241-2.zip
 
Источник
www.exploit-db.com

Похожие темы