No-IP Dynamic Update Client (DUC) 2.2.1 on Windows uses weak permissions for the HKLM\SOFTWARE\Vitalwerks\DUC registry key, which allows local users to obtain obfuscated passwords and other sensitive information by reading the (1) TrayPassword, (2) Username, (3) Password, and (4) Hosts registry values.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/29758 | vdb entry |
http://secunia.com/advisories/30714 | third party advisory vendor advisory |
http://securityreason.com/securityalert/3952 | third party advisory |
http://www.securityfocus.com/archive/1/493367/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43298 | vdb entry |