Microsoft KB Archive/168115

From BetaArchive Wiki
Knowledge Base


Malicious user with physical access to a computer can acquire cached domain password

Article ID: 168115

Article Last Modified on 1/19/2007



APPLIES TO

  • Microsoft Windows 98 Standard Edition
  • Microsoft Windows 95
  • Microsoft Windows 95
  • Microsoft Windows 95



This article was previously published under Q168115

This information does not apply to Microsoft Windows 98 Second Edition.

SYMPTOMS

If your computer runs Windows 95 or Windows 98 for use as a network workstation, it may be possible for a malicious user to acquire your network password. This attack would require that the malicious user have physical access to your computer at some point after you log on to a server or domain, but before the machine had been rebooted. While a program can be used to read the cached password, doing so requires physical access to your computer when it is not protected by a screen saver password and you must be running the Microsoft Client for Microsoft Networks.

RESOLUTION

If you are running Windows 98:

The following file is available for download from the Microsoft Download Center:

For more information about how to download Microsoft support files, click the following article number to view the article in the Microsoft Knowledge Base:

119591 How to obtain Microsoft support files from online services


Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to the file.

If you are running Windows 95 or Windows 95 OEM Service Release versions 1, 2, 2.1, or 2.5:

The following file is available for download from the Microsoft Download Center:

For more information about how to download Microsoft support files, click the following article number to view the article in the Microsoft Knowledge Base:

119591 How to obtain Microsoft support files from online services


Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to the file.

File name Version Date Time Size Platform
Msnp32.dll 4.00.957 11/13/98 12:42am 67,584 bytes Windows 95
Msnp32.dll 4.10.2000 11/17/98 2:55am 67,584 bytes Windows 98


STATUS

Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.

MORE INFORMATION

For more information about issues resolved by updates to thesecomponents, click the following article numbers to view the articles in the Microsoft Knowledge Base:

178824 Error message: Your password is too short


175051 Windows 95 roaming profiles do not work


176543 Windows 95 client is unable to receive roaming profiles


For more information about Windows 95 updates, click the following article number to view the article in the Microsoft Knowledge Base:

161020 Implementing Windows 95 updates


For related information on this problem, please visit the following Microsoft Web site:

For additional security-related information about Microsoft products, please visit the following Microsoft Web site:

For more information about Windows 98 and Windows 98 Second Edition hotfixes, click the following article number to view the article in the Microsoft Knowledge Base:

206071 General information about Windows 98 and Windows 98 Second Edition hotfixes



Additional query words: 98 95 Patch Available for "Legacy Credential Caching" Vulnerability

Keywords: kbdownload kbgraphxlinkcritical kbqfe kbenv kbprb kbhotfixserver KB168115