RunAs (runas.exe) in Windows 2000 stores cleartext authentication information in memory, which could allow attackers to obtain usernames and passwords by executing a process that is allocated the same memory page after termination of a RunAs command. NOTE: the vendor disputes this issue, saying that administrative privileges are already required to exploit it, and the original researcher did not respond to requests for additional information
Link | Tags |
---|---|
http://www.securityfocus.com/bid/3184 | vdb entry |
http://archives.neohapsis.com/archives/vulnwatch/2001-q4/0041.html | mailing list patch vendor advisory |
http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00100.html | mailing list |
http://www.iss.net/security_center/static/7531.php | vdb entry patch |