CVE-2000-0762

The default installation of eTrust Access Control (formerly SeOS) uses a default encryption key, which allows remote attackers to spoof the eTrust administrator and gain privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:broadcom:etrust_access_control:4.1:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:etrust_access_control:5.0:*:*:*:*:*:*:*
cpe:2.3:a:ca:etrust_access_control:4.1:sp1:*:*:*:*:*:*
cpe:2.3:a:ca:etrust_access_control:5.0:sp1:*:*:*:*:*:*

History

20 Nov 2024, 23:33

Type Values Removed Values Added
References () http://support.ca.com/techbases/eTrust/etrust_access_control-response.html - () http://support.ca.com/techbases/eTrust/etrust_access_control-response.html -
References () http://www.osvdb.org/1517 - () http://www.osvdb.org/1517 -
References () http://www.securityfocus.com/bid/1583 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/1583 - Patch, Vendor Advisory
References () http://www.securityfocus.com/templates/archive.pike?list=1&msg=004601c003a1%24ba473260%24ddeaa2cd%40itradefair.net - () http://www.securityfocus.com/templates/archive.pike?list=1&msg=004601c003a1%24ba473260%24ddeaa2cd%40itradefair.net -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/5076 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/5076 -

07 Nov 2023, 01:55

Type Values Removed Values Added
References
  • {'url': 'http://www.securityfocus.com/templates/archive.pike?list=1&msg=004601c003a1$ba473260$ddeaa2cd@itradefair.net', 'name': '20000811 eTrust Access Control - Root compromise for default install', 'tags': ['Patch', 'Vendor Advisory'], 'refsource': 'BUGTRAQ'}
  • () http://www.securityfocus.com/templates/archive.pike?list=1&msg=004601c003a1%24ba473260%24ddeaa2cd%40itradefair.net -

Information

Published : 2000-10-20 04:00

Updated : 2024-11-20 23:33


NVD link : CVE-2000-0762

Mitre link : CVE-2000-0762

CVE.ORG link : CVE-2000-0762


JSON object : View

Products Affected

ca

  • etrust_access_control

broadcom

  • etrust_access_control