{"vuid":"VU#305294","idnumber":"305294","name":"Shortcuts may insecurely store SMB authentication information","keywords":["KDE","password disclosure","SMB","Samba","shortcut","URI"],"overview":"SMB authentication information may be stored as plain text within URI shortcuts. As a result, a local attacker may be able read the authentication information and gain access to the share.","clean_desc":"SMB is a protocol for sharing data and resources between computers. Many operating systems support accessing SMB shares via URIs of the form: smb://domain\\username:password@server\\sharename If a shortcut to a protected SMB share is created, the URI (including the password section) will be stored as plain text within the shortcut. If an attacker can access the properties of the shortcut, they will be able to read the password and may be able to gain access to the protected share. According to reports, this vulnerability affects the KDE Desktop Environment. However, other applications or operating systems may be affected as well.","impact":"If a local attacker can create (or persuade a user to create) a shortcut to a protected SMB share and then gain access to that shortcut's properties, they will be able to read the SMB share's authentication information and consequently, gain access to the protected SMB share.","resolution":"We are currently unaware of a solution to this problem.","workarounds":"Lock Computer Users are encouraged to lock their computers when they step away from them.","sysaffected":"","thanks":"This vulnerability was reported by Daniel Fabian.","author":"This document was written by Jeff Gennari.","public":["h","t","t","p",":","/","/","w","w","w",".","d","e","r","k","e","i","l","e","r",".","c","o","m","/","M","a","i","l","i","n","g","-","L","i","s","t","s","/","s","e","c","u","r","i","t","y","f","o","c","u","s","/","b","u","g","t","r","a","q","/","2","0","0","4","-","1","1","/","0","3","9","4",".","h","t","m","l"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-12-02T15:00:46Z","publicdate":"2004-11-29T00:00:00Z","datefirstpublished":"2004-12-13T16:30:23Z","dateupdated":"2005-03-17T16:02:59Z","revision":116,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"10","cam_impact":"13","cam_easeofexploitation":"3","cam_attackeraccessrequired":"10","cam_scorecurrent":"1.389375","cam_scorecurrentwidelyknown":"1.755","cam_scorecurrentwidelyknownexploited":"3.2175","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.389375,"vulnote":null}