{"vuid":"VU#821865","idnumber":"821865","name":"CREDANT Mobile Guardian Shield fails to remove credentials from memory","keywords":["CREDANT Mobile Guardian","information disclosure","passwords","plaintext"],"overview":"CREDANT Mobile Guardian Shield fails to properly remove credentials from memory, which may allow an attacker to obtain access to the Windows domain and encrypted drive contents.","clean_desc":"CREDANT Mobile Guardian (CMG) Shield is a component of Mobile Guardian Enterprise Edition. CMG Shield provides policy-based encryption of specified files. CMG Shield fails to properly clear credentials out of system memory. The default configuration for CMG Shield does not encrypt the Windows pagefile, which means that the credentials may be written to disk. Please see the CREDANT vendor statement below in this vulnerability note for more details.","impact":"An attacker with access to the contents of system memory may be able to retrieve the user's credentials, which can allow access to encrypted files.","resolution":"Apply an update\nThis issue is addressed in CMG Enterprise Edition 5.2.1 SP1, which was released on May 1, 2007. Please see the CREDANT support site to obtain the update. Details for this vulnerability are available in the support post titled \"Vulnerability in Credant Mobile Guardian Shield for Windows.\"","workarounds":"","sysaffected":"","thanks":"Thanks to Michael Iacovacci for reporting this vulnerability.","author":"This document was written by Will Dormann.","public":["http://support.credant.com","http://secunia.com/advisories/25410/"],"cveids":["CVE-2007-2883"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-04-06T14:06:02Z","publicdate":"2007-05-24T00:00:00Z","datefirstpublished":"2007-06-01T14:15:53Z","dateupdated":"2007-06-01T14:16:12Z","revision":4,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"5","cam_impact":"4","cam_easeofexploitation":"4","cam_attackeraccessrequired":"18","cam_scorecurrent":"0.486","cam_scorecurrentwidelyknown":"0.621","cam_scorecurrentwidelyknownexploited":"1.161","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.486,"vulnote":null}