UltraEdit uses weak encryption to record FTP passwords in the uedit32.ini file, which allows local users who can read the file to decrypt the passwords and gain privileges.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=99861651923668&w=2 | |
http://www.eve-software.com/security/ueditpw.html | Exploit Vendor Advisory |
http://marc.info/?l=bugtraq&m=99861651923668&w=2 | |
http://www.eve-software.com/security/ueditpw.html | Exploit Vendor Advisory |
Configurations
History
20 Nov 2024, 23:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=99861651923668&w=2 - | |
References | () http://www.eve-software.com/security/ueditpw.html - Exploit, Vendor Advisory |
Information
Published : 2001-08-31 04:00
Updated : 2024-11-20 23:36
NVD link : CVE-2001-0983
Mitre link : CVE-2001-0983
CVE.ORG link : CVE-2001-0983
JSON object : View
Products Affected
ultraedit
- ultraedit-32
CWE