RSA BSAFE SSL-J 3.0, 3.0.1 and 3.1, as used in Cisco iCND 2.0, caches session IDs from failed login attempts, which could allow remote attackers to bypass SSL client authentication and gain access to sensitive data by logging in after an initial failure.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.ciac.org/ciac/bulletins/l-141.shtml - Patch, Vendor Advisory | |
References | () http://www.cisco.com/warp/public/707/SSL-J-pub.html - | |
References | () http://www.rsasecurity.com/products/bsafe/bulletins/BSAFE_SSL-J_3.x.SecurityBulletin.html - | |
References | () http://www.securityfocus.com/bid/3329 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/7112 - |
Information
Published : 2001-09-12 04:00
Updated : 2024-11-20 23:36
NVD link : CVE-2001-1105
Mitre link : CVE-2001-1105
CVE.ORG link : CVE-2001-1105
JSON object : View
Products Affected
cisco
- icdn
dell
- bsafe_ssl-j
CWE