The web administration interface for Interscan VirusWall 3.6.x and earlier does not use encryption, which could allow remote attackers to obtain the administrator password to sniff the administrator password via the setpasswd.cgi program or other HTTP GET requests that contain base64 encoded usernames and passwords.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2001-01/0235.html | Vendor Advisory |
http://www.securityfocus.com/bid/2212 | Vendor Advisory |
http://archives.neohapsis.com/archives/bugtraq/2001-01/0235.html | Vendor Advisory |
http://www.securityfocus.com/bid/2212 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2001-01/0235.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/2212 - Vendor Advisory |
Information
Published : 2001-03-12 05:00
Updated : 2024-11-20 23:34
NVD link : CVE-2001-0133
Mitre link : CVE-2001-0133
CVE.ORG link : CVE-2001-0133
JSON object : View
Products Affected
trend_micro
- interscan_viruswall
CWE