what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ccc_harvest.txt

ccc_harvest.txt
Posted Apr 7, 2001
Authored by Richard Scott

CCC Harvest v5.0, a tool to audit and maintain access control to source code, uses an encryption method which is susceptible to a chosen plaintext attack, allowing users to capture and decrypt the application admin password.

tags | exploit
SHA-256 | 5a798c2dd6883904e1ff332f33f014a1e9d3c67e7e7a1f395706ba7937e39ec3

ccc_harvest.txt

Change Mirror Download
-=> Zero Tolerance Technologies (T) Security Advisory <=-
Reference: ZTT-SA01-27032001
Author: Richard Scott, r1ccard0@the-pentagon.com

Product: Computer Associates' CCC\Harvest Source Code
control software
http://ca.com/products/ccc_harvest.htm
http://ca.com/products/descriptions/ccc_harvest.pdf

Severity:
High, Application superuser can be obtained.

Systems:
CCC\Harvest v5.0 running on NT\2000, could also apply to
other platforms and versions.
Discovered: 26th March 2001

Synopsis
CCC Harvest is a tool that is used to audit and maintain
access control to source code If the security mechanism is
broken, source code can be modified and downloaded with
little audit to trail.

CCC Harvest has an authentication model that uses TCP to
transmit the security credentials to the server for
authentication. The encryption method used is susceptible
to a chosen plaintext attack.
Length of password does not increase the security. No
feedback chaining is used to prevent repeated terms in the
plaintext appearing in the ciphertext. A user could
discover the superuser password in encrypted form and then
apply character substitution to reveal the plaintext.

Exploit:
Using a chosen plain text attack, the character substitution
matrix can be constructed. Using this matrix, it is
possible to simply look up each ciphertext character to
reveal it's plaintext equivalent.

The password that was captured using a network analyzer in
encrypted form was:
yfohoh>u[ghhdptj1111111.

Using the matrix above, the resulting plain text would be:
ThisismypasswordQQQQQQQ

If other characters had been used, it's pretty easy to see
how a plain text attack would extend, just feed in the ASCII
character set and review the ciphertext that appears. The
last few characters also reveal another weakness. The
algorithm that is being used, seems to take one character at
a time, and doesn't use any loop back mechanism to prevent
repeating terms in the plaintext occurring in the
ciphertext.

Vendor Notification:
CCC\Harvest have been notified through their support system,
found at : http://support.ca.com/a-g.html
I've had a response that all they are willing to say is that
this is the current mechanism. There may be some confusion
as the extent of the exploit. But I've tried to notify them
of the problem.

Current research has led me to believe the following:
1) the encryption key is hard coded in to the application
2) the key is the same for all installations of
CCC\Harvest

As of 27-03-2001 CA are aware of the problem

Solution
If CCC\Harvest supports NT authentication, it should be
used.
Changing the key is not a sufficient precaution to prevent
this attack.


_____________________________________________
Free email with personality! Over 200 domains!
http://www.MyOwnEmail.com

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close