Novell iChain 2.2 before Support Pack 1 uses a shorter timeout for a non-existent user than a valid user, which makes it easier for remote attackers to guess usernames and conduct brute force password guessing.
References
Link | Resource |
---|---|
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2966435.htm | Broken Link Patch |
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2966435.htm | Broken Link Patch |
Configurations
History
20 Nov 2024, 23:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://support.novell.com/cgi-bin/search/searchtid.cgi?/2966435.htm - Broken Link, Patch |
15 Feb 2024, 18:46
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) http://support.novell.com/cgi-bin/search/searchtid.cgi?/2966435.htm - Broken Link, Patch | |
CWE | CWE-203 |
Information
Published : 2003-08-27 04:00
Updated : 2024-11-20 23:45
NVD link : CVE-2003-0637
Mitre link : CVE-2003-0637
CVE.ORG link : CVE-2003-0637
JSON object : View
Products Affected
novell
- ichain
CWE
CWE-203
Observable Discrepancy