The remote administration client for RhinoSoft Serv-U 3.0 sends the user password in plaintext even when S/KEY One-Time Password (OTP) authentication is enabled, which allows remote attackers to sniff passwords.
References
Link | Resource |
---|---|
http://securitytracker.com/id?1002882 | Exploit |
http://www.kb.cert.org/vuls/id/279763 | Exploit US Government Resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7925 | |
http://securitytracker.com/id?1002882 | Exploit |
http://www.kb.cert.org/vuls/id/279763 | Exploit US Government Resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7925 |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://securitytracker.com/id?1002882 - Exploit | |
References | () http://www.kb.cert.org/vuls/id/279763 - Exploit, US Government Resource | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/7925 - |
Information
Published : 2001-11-19 05:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1463
Mitre link : CVE-2001-1463
CVE.ORG link : CVE-2001-1463
JSON object : View
Products Affected
solarwinds
- serv-u_file_server
CWE
CWE-310
Cryptographic Issues