National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2001-0983 Detail

Description

UltraEdit uses weak encryption to record FTP passwords in the uedit32.ini file, which allows local users who can read the file to decrypt the passwords and gain privileges.

Source:  MITRE      Last Modified:  08/31/2001

Quick Info

CVE Dictionary Entry:
CVE-2001-0983
Original release date:
08/31/2001
Last revised:
10/17/2016
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
4.6 MEDIUM
Vector:
(AV:L/AC:L/Au:N/C:P/I:P/A:P) (legend)
Impact Subscore:
6.4
Exploitability Subscore:
3.9
CVSS Version 2 Metrics:
Access Vector:
Locally exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Provides user account access, Allows partial confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from UltraEdit (03/06/2012)

We include an option, by design, that allows the user to *not* save the password, and instead enter the password on a per FTP session basis. This would provide the highest level of security. If the user decides to have UltraEdit save the FTP password in the INI, it is encrypted for the benefit of the user moving their settings from one system to another. However, even with the highest level of encryption of the saved password, if the user decides to save their password in the INI, there will always be a level of vulnerability as a result of the users decision to save the password.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://marc.info/?l=bugtraq&m=99861651923668&w=2 External Source BUGTRAQ 20010823 Re: Respondus v1.1.2 stores passwords using weak encryption
http://www.eve-software.com/security/ueditpw.html Exploit; Vendor Advisory External Source MISC http://www.eve-software.com/security/ueditpw.html

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:a:ultraedit:ultraedit-32:*:*:*:*:*:*:*:*

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 3 change records found - show changes