Vulnerability Note VU#821865
CREDANT Mobile Guardian Shield fails to remove credentials from memory
CREDANT Mobile Guardian Shield fails to properly remove credentials from memory, which may allow an attacker to obtain access to the Windows domain and encrypted drive contents.
CREDANT Mobile Guardian (CMG) Shield is a component of Mobile Guardian Enterprise Edition. CMG Shield provides policy-based encryption of specified files. CMG Shield fails to properly clear credentials out of system memory. The default configuration for CMG Shield does not encrypt the Windows pagefile, which means that the credentials may be written to disk. Please see the CREDANT vendor statement below in this vulnerability note for more details.
An attacker with access to the contents of system memory may be able to retrieve the user's credentials, which can allow access to encrypted files.
Apply an update
This issue is addressed in CMG Enterprise Edition 5.2.1 SP1, which was released on May 1, 2007. Please see the CREDANT support site to obtain the update. Details for this vulnerability are available in the support post titled "Vulnerability in Credant Mobile Guardian Shield for Windows."
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|CREDANT Technologies, Inc.||Affected||17 Apr 2007||01 Jun 2007|
CVSS Metrics (Learn More)
Thanks to Michael Iacovacci for reporting this vulnerability.
This document was written by Will Dormann.
- CVE IDs: CVE-2007-2883
- Date Public: 24 May 2007
- Date First Published: 01 Jun 2007
- Date Last Updated: 01 Jun 2007
- Severity Metric: 0.49
- Document Revision: 4
If you have feedback, comments, or additional information about this vulnerability, please send us email.